Cyber Security Training Courses
Learning Tree offers cyber security training courses and certification programmes for all levels of an organisation, including the C-suite, to ensure that everyone is responsible for protecting against cyber threats and supporting IT security programmes and policies. Their curriculum covers specialised IT security training, security best practices, and certifications such as CISSP, CompTIA Security+, CASP, and CEH.
-
ISACA
The cloud audit certification training teaches the essential principles needed to successfully obtain the Certificate of Cloud Auditing Knowledge (CCAK).
Cloud Audit, Cloud Computing, Auditing, Certification, CCAK, Cloud Security, Best Practices, ISACA, IT Audit, Cybersecurity, Risk, Privacy, Governance, Cloud Security Alliance, Cloud Auditing Knowledge, Cloud Audit Certification, Cloud Security Certification Clud Audit Cloude Audit Cloud Auditing Cloud Computting Auditing Certification CCAK Certification Cloud Security Best Practises IT Auditing Cyber Security Privicy Governence Cloud Security Allience Cloud Auditing Knowlege Cloud Audit Certifcation Cloud Security Certifcation Molnrevision, molncomputing, revision, certifiering, CCAK, molnsäkerhet, bästa praxis, ISACA, IT-revision, cybersäkerhet, risk, integritet, styrning, Cloud Security Alliance, Cloud Auditing Knowledge, Cloud Audit Certification, Cloud Security Certification Clud Audit Cloude Audit Cloud Auditing Cloud Computting Certifiering av revision CCAK-certifiering Bästa praxis för molnsäkerhet IT-revision Cybersäkerhet Privatliv Styrning Cloud Security Allience Cloud Auditing Knowlege Certifiering av molnrevision Certifiering av molnsäkerhet
Intermediate3 daysOnline or In-classStarts from 25 900 kr -
Microsoft
Get certified in Microsoft Azure Security with Learning Tree's AZ-500 course. Enhance your IT security skills and protect your organisation's data.
AZ-500, AZ500, AZ-50, AZ-500T, 8530AZ-500, AZ-500, AZ500, AZ, 500, security controls, security posture, security vulnerabilities, identity and access, platform protection, data protection, application security, security operations, defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, zero trust model, Virtual Private Networks, VPN, Internet Security Protocol, IPSec, Secure Socket Layer, SSL, disk encryption, data encryption, Azure administration, Windows operating system, Linux operating system, scripting languages, PowerShell, CLI, Azure Security Engineer, certification exam, Microsoft Azure Security Technologies, securty, acess, platfrom, securtiy, opetartions, virtaul, IPSek, encription, sccurity, administraton
Intermediate4 daysOnline or In-classStarts from 30 730 kr -
Microsoft
Learn about security, compliance, and identity concepts with Microsoft solutions. Perfect for SC-900 exam prep.
sc900, Microsoft Security, Compliance, Identity, Cloud-based Solutions, Networking, Cloud Computing, General IT Knowledge, Microsoft Azure, Microsoft 365, Familiarisation, Fundamentals, SCI, SC-900 Exam, Objective Domain, End-to-end Solution, Holistic Solution, Cloud Services, Cloud Security, Compliance Concepts, Identity Concepts, Security Concepts, Microsoft Tools, Microsoft Security Solutions, Identity Management, Access Management, Risk Management, Governance, Certification, Authentication, Authorisation, Misconfigurations, Cybersecurity, Threats, Vulnerabilities, Policies, Best Practices, sc900, Microsoft Security, Compliance, Identity, Fundamentals Training, SC-900, networking, cloud computing, IT, Microsoft Azure, Microsoft 365, security, compliance, identity solutions, cloud-based, SC-900 exam, objective domain, end-to-end solution, Microsft, Securty, Complience, Identiy, Azur, Msft 365 Microsoft Security, Compliance, Identity, Fundamentals Training, SC-900, nätverk, molntjänster, IT, Microsoft Azure, Microsoft 365, säkerhet, efterlevnad, identitetslösningar, molnbaserade, SC-900-examen, måldomän, helhetslösning, stavfel Microsft, Securty, Complience, Identiy, Azur, Msft 365.
Foundation1 dayOnline or In-classStarts from 9 170 kr -
Microsoft
Prepare for the SC-200 exam with this course for Security Operations professionals people who work in a Security Operations job role.
sc200, Microsoft Security Operations Analyst Training, SC-200, investigate, respond, hunt for threats, Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, mitigate cyber threats, configure, Kusto Query Language, KQL, detection, analysis, reporting, security operations role, exam prep, Microsfot Security Operations Analyst, Azure Snetinel, Kusto Query Langauge, sc200, Microsoft Security Operations Analyst Training, SC-200, investigate, respond, hunt, threats, Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, mitigate, cyber threats, technologies, configure, Kusto Query Language, detection, analysis, reporting, security operations role, exam, Microsoft Securty Operations Analyst Training, SC200, Azure Defendar, Kusto Query Languge Microsoft Security Operations Analyst Training, SC-200, undersöka, svara, jaga, hot, Microsoft Azure Sentinel, Azure Defender, Microsoft 365 Defender, mildra, cyberhot, teknologier, konfigurera, Kusto Query Language, detektion, analys, rapportering, säkerhetsoperationsroll, examen, Microsoft Securty Operations Analyst Training, SC200, Azure Defendar, Kusto Query Languge.
Intermediate4 daysOnline or In-classStarts from 30 730 kr -
Microsoft
This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.
SC300, Microsoft, Identity, Access, Administrator, Training, SC-300, Azure AD, design, implement, operate, organization, identity management, access management, secure authentication, authorization, enterprise applications, seamless experiences, self-service management, users, adaptive access, governance, troubleshooting, monitoring, reporting, environment, team, collaboration, strategic identity projects, modernize identity solutions, hybrid identity solutions, identity governance, identiy, adimnistrator, authenticaion, authoriztion, enterpise, experieces, managemnt, adaptie, govrenance, truobleshooting, monioring, reporing, envirnoment, SC300, Microsoft, Identity, Access, Administrator, Training, SC-300, Azure AD, design, implement, operate, organisation, management systems, secure authentication, authorisation, enterprise applications, seamless experiences, self-service management, users, adaptive access, governance, troubleshoot, monitor, report, environment, individual, team, collaborate, strategic identity projects, modernise, hybrid identity solutions, identity governance. Micorsoft, Identy, Acces, Administator, Trainig, SC300, Azur AD, authentification, authorization, enterprize, experinces, self servise, adaptiv, goverance, trubleshoot, moniter, enviorment, indvidual, collabrate, strategik, identy solutins, hybrid identy solutins, identy govornance. Microsoft, Identitet, Åtkomst, Administratör, Utbildning, SC-300, Azure AD, design, implementera, driva, organisation, hanteringssystem, säker autentisering, auktorisation, företagsapplikationer, sömlösa upplevelser, självbetjäning, användare, anpassad åtkomst, styrning, felsökning, övervaka, rapportera, miljö, individ, team, samarbeta, strategiska identitetsprojekt, modernisera, hybrididentitetslösningar, identitetsstyrning. Micorsoft, Identy, Acces, Administator, Trainig, SC300, Azur AD, authentification, authorization, enterprize, experinces, self servise, adaptiv, goverance, trubleshoot, moniter, enviorment, indvidual, collabrate, strategik, identy solutins, hybrid identy solutins, identy govornance.
Intermediate4 daysOnline or In-classStarts from 30 730 kr -
Microsoft
This course helps learners prepare for Information Protection and Compliance in Microsoft 365 exam (SC-400).
Microsoft Information Protection Administrator Training (SC-400), Microsoft Information Protection Administrator Training, SC400, Microsoft, Information Protection, Administrator, Training, SC-400, data governance, data loss prevention, sensitive information types, sensitivity labels, data retention policies, Office 365, message encryption, exam preparation, data security, information security, data protection, security policies, data classification, access control, compliance, risk management, threat detection, incident response, vulnerability management, cybersecurity, privacy, confidentiality, misconfigurations, audit logs, security assessments, security awareness, security training, encryption, decryption, key management, identity and access management, authentication, authorisation, network security, endpoint security, cloud security, application security, mobile security, device management, data backup, disaster recovery, business continuity, legal and regulatory requirements, industry standards, best practices, mistakes, troubleshooting. Microsft, Infrmation, Prtection, Adminstrator, Traning, SC400, data goverance, data loss prevntion, sensetive, information types, sensivity, lables, data rentention, polices, Ofice 365, mesage, encrytion, exam prep, data secuirty, information secuirty, data protecton, secuirty polices, data clasification, access contol, complience, risk managment, threat detection, incident responce, vulnarability managment, cyberscurity, privicy, confidntiality, misconfigurations, audit logs, secuirty asssessments, secuirty awarness, secuirty traning, encrytion, decrytion, key managment, identity and access managment, athentication, authorisation, network secuirty, endpoint secuirty, cloud secuirty, application secuirty, mobile secuirty, device managment, data bakup, disaster recovery, business continuty, legal and regulatry requirments, industry standards, best pratices, commen mistakes, troubleshootin, SC400, SC-400, Microsoft Information Protection Administrator, SC-400, data governance, information protection, data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Office 365 message encryption, exam preparation, data security, data privacy, data protection, information security, information privacy, information protection policies, data encryption, data classification, data leakage prevention, data protection regulations, compliance, risk management, data handling, data auditing, data compliance, data governance policies, data protection standards, information management, information governance, information classification, information leakage prevention, information protection regulations, information compliance, information risk management, information handling, information auditing, information governance policies, information protection standards, sensitive data protection, sensitive information management, sensitive data handling, sensitive data compliance, sensitive data auditing, sensitive data governance policies, sensitive data protection standards, SC400, Microsoft Information Protection, Microsoft 365 security, Microsoft 365 compliance, Microsoft 365 data protection, Microsoft 365 information protection, Microsoft 365 data governance, Microsoft 365 information governance, Microsoft 365 data classification, Microsoft 365 information classification, Microsoft 365 data risk management, Microsoft 365 information risk management, Microsoft 365 data leakage prevention, Microsoft 365 information leakage prevention, Microsoft 365 data retention policies, Microsoft 365 information retention policies, Microsoft 365 message encryption, Microsoft 365 data privacy, Microsoft 365 information privacy. Microsoft Information Protecion Administrator, SC400, data goverance, information protecion, data loss prevetion policies, sensetive information types, sensitivity lables, data retension policies, Office365 message encryption, exam preperation, data secutiry, data privicy, data protecion, information secutiry, information privicy, information protecion policies, data encrytion, data clasification, data leakage prevetion, data protecion regulations, compliance, risk managment, data handeling, data auditing, data compliance, data goverance policies, data protecion standards, information managment, information goverance, information clasification, information leakage prevetion, information protecion regulations, information compliance, information risk managment, information handeling, information auditing, information goverance policies, information protecion standards, sensetive data protecion, sensetive information managment, sensetive data handeling, sensetive data compliance, sensetive data auditing, sensetive data goverance policies, sensetive data protecion standards, Microsoft Information Protecion, Microsoft 365 secutiry, Microsoft 365 compliance, Microsoft 365 data protecion, Microsoft 365 information protecion, Microsoft 365 data goverance, Microsoft 365 information goverance, Microsoft 365 data Microsoft Information Protection Administrator, SC-400, datagovernance, informationskydd, förebyggande av dataläckage, känsliga informationsklasser, känslighetsmärkning, datalagringspolicyer, Office 365-meddelande-kryptering, examensförberedelse, dataskydd, datasekretess, dataskydd, informationsäkerhet, informationssekretess, informationskyddspolicyer, datakryptering, dataklassificering, förebyggande av dataläckage, dataskyddsregler, efterlevnad, riskhantering, datahantering, datarevision, dataskyddsöverensstämmelse, datagovernancepolicyer, dataskyddsstandarder, informationshantering, informationsstyrning, informationsklassificering, förebyggande av informationsläckage, informationskyddsregler, informationsöverensstämmelse, informationsriskhantering, informationshantering, informationsrevision, informationsstyrningspolicyer, informationskyddsstandarder, skydd av känslig information, hantering av känslig information, efterlevnad av känslig information, revision av känslig information, känslig datagovernancepolicy, känsliga dataskyddsstandarder, SC400, Microsoft Information Protection, Microsoft 365-säkerhet, Microsoft 365-efterlevnad, Microsoft 365-dataskydd, Microsoft 365-informationskydd, Microsoft 365-datagovernance, Microsoft 365-informationsstyrning, Microsoft 365-dataklassificering, Microsoft 365-informationsklassificering, Microsoft 365-datriskhantering, Microsoft 365-informationsriskhantering, Microsoft 365-förebyggande av dataläckage, Microsoft 365-förebyggande av informationsläckage, Microsoft 365-datalagringspolicyer, Microsoft 365-informationslagringspolicyer, Microsoft 365-meddelandekryptering, Microsoft 365-dataskydd, Microsoft 365-informationssekretess. Microsoft Information Protecion Administrator, SC400, data goverance, information protecion, data loss prev
Intermediate4 daysOnline or In-classStarts from 30 730 kr -
ISC2
The CCSP Training and Certification course teaches the knowledge & skills needed to pass the certification & become a Certified Cloud Security Professional.
CCSP training, CCSP certification, cloud security, data security, cloud infrastructure security, information security, secure data centers, cloud environments, cloud-based data access, cloud security solutions, security incidents, cloud computing technologies, Microsoft Azure, physical infrastructure, cloud resource access control, sensitive data protection, load balancers, security operations centers, cloud environment security, U.S. DoD Directive 8140/8570.01 Technical IAT Level-III, Information Assurance Security Architect/Engineer IASAE Level-III. CCSP traning, CCSP certifcation, clud security, data secuirty, cloud infrastruture security, infomration security, secruing data centers, clud enviornments, clud based data access, clud security solutons, secuirty incidents, clud computing technologies, Micosoft Azure, physical infrastrucutre, clud resouce access control, sensetive data protection, load balancers, secuirty operations centers, clud enviornment security, U.S. DoD Directive 8140/8570.01 Technical IAT Level-III, Infomration Assurance Security Architect/Engineer IASAE Level-III. CCSP training, CCSP certification, cloud security, data security, cloud infrastructure security, information security, secure data centres, cloud environments, cloud-based data access, cloud security solutions, security incidents, cloud computing technologies, Microsoft Azure, physical infrastructure, cloud resource access control, sensitive data protection, load balancers, security operations centres, cloud environment security, UK MoD Directive 8140/8570.01 Technical IAT Level-III, Information Assurance Security Architect/Engineer IASAE Level-III. CCSP training, CCSP certification, cloud security, data security, cloud infrastructure security, information security, securing data centres, cloud environments, cloud-based data access, cloud security solutions, security incidents, cloud computing technologies, Microsoft Azure, physical infrastructure, cloud resource access control, sensitive data protection, load balancers, security operations centres, cloud environment security, UK MoD Directive 8140/8570.01 Technical IAT Level-III, Information Assurance Security Architect/Engineer IASAE Level-III.
Intermediate5 daysOnline or In-classStarts from 40 040 kr -
Learning Tree
This identity & access management course will teach you to protect your IT resources. Learn Single Sign-On, PKI, Federated Identity Management & more!
identity management, access management, IAM, IdM, single sign-on, SSO, public key infrastructure, PKI, federated identity management, FIM, security, Windows operating system, identiti management, acess management, IaM, iDM, single sign on, publik key infrastructure, fedrated identity managment, secruity, Windows operatng system identitets hantering, åtkomsthantering, IAM, IdM, ensam inloggning, SSO, offentlig nyckel infrastruktur, PKI, federerad identitets hantering, FIM, säkerhet, Windows operativsystem, stavfel identiti hantering, acess hantering, IaM, iDM, ensam inloggning, publik nyckel infrastruktur, fedrerad identitets hantering, säkerhet, Windows operativsystem.
Intermediate4 daysOnline or In-classStarts from 32 130 kr -
CertNexus
CertNexus CyberSAFE Training: Avoid phishing, social engineering, viruses, ransomware & malware.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, Cybersecurity, Cybersecurity training, Cybersecurity awareness, Cybersecurity risks, Cybersecurity protection, Cybersecurity breaches, Network vulnerabilities, Data security, Computer security, Mobile device security, Internet security, Cloud security, Certified CyberSAFE Essentials Training, CyberSAFE Essentials, CyberSAFE Training, CyberSAFE Certification, CyberSAFE, CyberSAFE course, CyberSAFE seminar, CyberSAFE workshop, CyberSAFE program, CyberSAFE education, Cybersecurity education, Cybersecurity course, Cybersecurity seminar, Cybersecurity workshop, Cybersecurity program, Cybersecurity certification, Cybersecurity certificate, Cybersecurity training program, Cybersecurity training course, Cybersecurity training seminar, Cybersecurity training workshop, Cybersecurity training education, Cybersecurity awareness training, Cybersecurity awareness program, Cybersecurity awareness seminar, Cybersecurity awareness workshop, Cybersecurity awareness education, Cybersecurity risks training, Cybersecurity risks program, Cybersecurity risks seminar, Cybersecurity risks workshop, Cybersecurity risks education, Cybersecurity protection training, Cybersecurity protection program, Cybersecurity protection seminar, Cybersecurity protection workshop, Cybersecurity protection education, Cybersecurity breaches training, Cybersecurity breaches program, Cybersecurity breaches seminar, Cybersecurity breaches workshop, Cybersecurity breaches education, Network vulnerabilities training, Network vulnerabilities program, Network vulnerabilities seminar, Network vulnerabilities workshop, Network vulnerabilities education, Data security training, Data security program, Data security seminar, Data security workshop, Data security education, Computer security training, Computer security program, Computer security seminar, Computer security workshop, Computer security education, Mobile device security training, Mobile device security program, Mobile device security seminar, Mobile device security workshop, Mobile device security education, Internet security training, Internet security program, Internet security seminar, Internet security workshop, Internet security education, Cloud security training, Cloud security program, Cloud security seminar, Cloud security workshop, Cloud security education, Cyber security, Cyber security training, Cyber security awareness, Cyber security risks, Cyber security protection, Cyber security breaches, Cyber security course, Cyber security seminar, Cyber security workshop, Cyber security program, Cyber security education, Cyber security certification, Cyber security certificate, Cyber security training program, Cyber security training course, Cyber security training seminar, Cyber security training workshop, Cyber security training education, Cyber security awareness training, Cyber security awareness program, Cyber security awareness seminar, Cyber security awareness workshop, Cyber security awareness education, Cyber security risks training, Cyber security risks program, Cyber security risks seminar, Cyber security risks workshop, Cyber security risks education, Cyber security protection training, Cyber security protection program, Cyber security protection seminar, Cyber security protection workshop, Cyber security protection education, Cyber security breaches training, Cyber security breaches program, Cyber security breaches seminar, Cyber security breaches workshop, Cyber security breaches education, Network vulnerability, Network vulnerability training, Network vulnerability program, Cybersäkerhet, Cybersäkerhetsträning, Cybersäkerhetsmedvetenhet, Cybersäkerhetsrisker, Cybersäkerhetsskydd, Cybersäkerhetsintrång, Nätverkssårbarheter, Dataskydd, Datorsäkerhet, Mobil enhetssäkerhet, Internetsäkerhet, Molnsäkerhet, Certifierad CyberSAFE Essentials-utbildning, CyberSAFE Essentials, CyberSAFE-utbildning, CyberSAFE-certifiering, CyberSAFE, CyberSAFE-kurs, CyberSAFE-seminarium, CyberSAFE-workshop, CyberSAFE-program, CyberSAFE-utbildning, Cybersäkerhetsutbildning, Cybersäkerhetskurs, Cybersäkerhetsseminarium, Cybersäkerhetsworkshop, Cybersäkerhetsprogram, Cybersäkerhetscertifiering, Cybersäkerhetscertifikat, Cybersäkerhetsutbildningsprogram, Cybersäkerhetsutbildningskurs, Cybersäkerhetsutbildningsseminarium, Cybersäkerhetsutbildningsworkshop, Cybersäkerhetsutbildning, Cybersäkerhetsmedvetenhetsträning, Cybersäkerhetsmedvetenhetsprogram, Cybersäkerhetsmedvetenhetsseminarium, Cybersäkerhetsmedvetenhetsworkshop, Cybersäkerhetsmedvetenhetsutbildning, Cybersäkerhetsriskträning, Cybersäkerhetsriskprogram, Cybersäkerhetsriskseminarium, Cybersäkerhetsriskworkshop, Cybersäkerhetsriskutbildning, Cybersäkerhetsskyddsträning, Cybersäkerhetsskyddsprogram, Cybersäkerhetsskyddsseminarium, Cybersäkerhetsskyddsworkshop, Cybersäkerhetsskyddsutbildning, Cybersäkerhetsintrångsträning, Cybersäkerhetsintrångsprogram, Cybersäkerhetsintrångsseminarium, Cybersäkerhetsintrång
FoundationLess than a dayOnline or In-classStarts from 2 786 kr -
CompTIA
This CompTIA PenTest+® course introduces the general concept and methodologies related to penetration testing & preps you for the PT0-002 exam.
plus, pentestplus, CompTIA PenTest+, certification exam, penetration testing, concepts, methodologies, simulated pen test, U.S. DoD Directive 8140/8570.01, CSSP Analyst, CSSP Incident Responder, CSSP Auditor, CSSP Infrastructure Support, prep course, pass the exam, reinforce concepts, fictitious company, training CompTIA PenTest+, certifieringsexamen, penetreringstestning, koncept, metoder, simulerat pen test, U.S. DoD Directive 8140/8570.01, CSSP-analytiker, CSSP-incidenthanterare, CSSP-revisor, CSSP-infrastrukturstöd, förberedelsekurs, klara examen, förstärka koncept, fiktivt företag, träning.
Intermediate5 daysOnline or In-classStarts from 27 930 kr -
Learning Tree
In this Penetration Testing course, you will learn to discover weaknesses in your own network by using the mindset and methods of a hacker.
Penetration testing, ethical hacking, network security, vulnerability assessment, exploit development, risk management, cyber security, intrusion testing, security assessment, penetration testing tools, hacking techniques, antivirus evasion, network defense, security countermeasures, vulnerability testing, security testing, penetration testing certification, cyber defense, penetration testing course, ethical hacking training, network penetration testing, security auditing, vulnerability scanning, security consulting, cyber risk assessment, penetration testing services, web application penetration testing, wireless network security, penetration testing methodology, security hardening, security testing tools, security awareness training, security incident response, security operations center, security testing services, security testing methodologies, penetration testing companies, security assessment services, security testing certification, security testing courses, security testing methodology, security testing techniques, security testing tools and techniques Penatration testing, pentration testing, penitration testing, penetration testingt, peneration testing, penetration teting, penetration testin, penatration testing tools, pentration testing techniques, penitration testing course, penetration testing certifcation, ethcal hacking training, securty testing, secuirty testing, penatration testing certification, pentration testing course, penitration testing tools, penitration testing techniques, penetraion testing, penetraion testing tools, penetraion testing techniques Penetrationstestning, etiskt hackande, nätverkssäkerhet, sårbarhetsbedömning, exploit-utveckling, riskhantering, cybersäkerhet, intrångstestning, säkerhetsbedömning, verktyg för penetrationstestning, hackningstekniker, antivirusundvikande, nätverksförsvar, säkerhetsåtgärder, sårbarhetstestning, säkerhetstestning, certifiering för penetrationstestning, cybersäkerhet, kurs i penetrationstestning, utbildning i etiskt hackande, nätverkspenetrationstestning, säkerhetsrevision, sårbarhetsskanning, säkerhetskonsultation, bedömning av cyberrisker, tjänster för penetrationstestning, penetrationstestning av webbapplikationer, trådlös nätverkssäkerhet, metodik för penetrationstestning, säkerhetshärdning, verktyg för säkerhetstestning, utbildning i säkerhetsmedvetenhet, incidenthantering, säkerhetsoperationscenter, tjänster för säkerhetstestning, metodik för säkerhetstestning, företag som utför penetrationstestning, tjänster för säkerhetsbedömning, certifiering för säkerhetstestning, kurser i säkerhetstestning, metodik för säkerhetstestning, tekniker för säkerhetstestning, verktyg och tekniker för säkerhetstestning Penatration testning, pentration testning, penitration testning, penetration testingt, peneration testning, penetration teting, penetration testin, penatration testning tools, pentration testning techniques, penitration testning course, penetration testing certifcation, ethcal hacking training, securty testing, secuirty testing, penatration testing certification, pentration testing course, penitration testing tools, penitration testing techniques, penetraion testing, penetraion testing tools, penetraion testing techniques
Intermediate4 daysOnline or In-classStarts from 32 130 kr -
EC-Council
Get CEH certified with our training course! Learn to protect your network with hands-on labs and tools. Pass the EC-Council CEH v12 exam.
CEH v12, ethical hacking, network security, cybersecurity, penetration testing, vulnerability assessment, network defense, risk assessment, security assessment, security audit, DoD Directive 8140/8570.01, CSSP Analyst, CSSP Infrastructure Support, CSSP Auditor, CSSP Incident Responder, ethical hack, CEH training, network secutiry, cybersecurity, penetration testing, vulnerability assement, network defence, risk assement, security assement, security audit, DoD Directive 8140/8570.01, CSSP Analist, CSSP Infrastructure Suppport, CSSP Auditer, CSSP Incident Respondr. CEH v12, etisk hacking, nätverkssäkerhet, cybersäkerhet, penetreringstestning, sårbarhetsbedömning, nätverksförsvar, riskbedömning, säkerhetsbedömning, säkerhetsrevision, DoD-direktiv 8140/8570.01, CSSP-analytiker, CSSP-infrastrukturstöd, CSSP-revisor, CSSP-incidenthanterare, stavfel etisk hackning, CEH-utbildning, nätverkssäkerhet, cybersäkerhet, penetreringstestning, sårbarhetsbedömning, nätverksförsvar, riskbedömning, säkerhetsbedömning, säkerhetsrevision, DoD-direktiv 8140/8570.01, CSSP-analist, CSSP-infrastrukturstöd, CSSP-revisor, CSSP-incidenthanterare.
Intermediate5 daysOnline or In-classStarts from 41 930 kr -
EC-Council
Learn a holistic approach to organisational threat intelligence in this course. Build effective defenses against future attacks.
Certified Threat Intelligence Analyst, C|TIA, training program, business risks, internal threats, external threats, method-driven course, holistic approach, organisational threat intelligence, effective threat intelligence, secure organisations, future threats, attacks, Certified Threat Inteligence Analyst, Certified Threat Intelligence Analist, C|TIA training, C|TIA program, organisational threat inteligence Certified Threat Intelligence Analyst, C|TIA, utbildningsprogram, affärsrisker, interna hot, externa hot, metoddriven kurs, holistiskt tillvägagångssätt, organisatorisk hotanalys, effektiv hotanalys, säkra organisationer, framtida hot, attacker, stavfel Certified Threat Inteligence Analyst, Certified Threat Intelligence Analist, C|TIA-utbildning, C|TIA-program, organisatorisk hotanalys.
Advanced3 daysOnline or In-class -
CompTIA
This CASP+® Training course prepares you for the CASP+ exam certifying your knowledge and skills in enterprise security and risk management.
plus, caspplus, ADVANCED SECURITY PRACTITIONER, ADVANCED CYBERSECURITY PRACTITIONER, ADVAN, ADVANCED CYBER SECURITY PRACTITIONER, CASP+ exam, enterprise security, risk management, research and analysis, computing, communications, business disciplines, CompTIA CASP+ Certification Exam, U.S. DoD Directive 8140/8570.01, Technical IAT Level-III, Management IAM Level-II, Information Assurance Security Architect/Engineer IASAE Level-I, Level II, certification, training, preparation, skills, knowledge. CAS+ exam enterprise secutiry risk managment comptia CASP+ certification US DoD Directive 8140/8570.01 Technical IAT Level III Management IAM Level II Information Assurance Security Architect/Engineer IASAE Level I preparation for CASP+ exam skill and knowledge in enterprise security CASP+ examen, företagssäkerhet, riskhantering, forskning och analys, databehandling, kommunikation, affärsdiscipliner, CompTIA CASP+ certifieringsexamen, U.S. DoD Direktiv 8140/8570.01, Teknisk IAT Nivå-III, Ledning IAM Nivå-II, Informationssäkerhetsarkitekt/ingenjör IASAE Nivå-I, Nivå-II, certifiering, utbildning, förberedelse, färdigheter, kunskap. CAS+ examen företagssekutitet riskhantering comptia CASP+ certifiering US DoD Direktiv 8140/8570.01 Teknisk IAT Nivå III Ledning IAM Nivå II Informationssäkerhetsarkitekt/ingenjör IASAE Nivå I förberedelse inför CASP+ examen färdigheter och kunskap inom företagssäkerhet
Advanced5 daysOnline or In-classStarts from 32 130 kr -
CompTIA
This official CompTIA CySA+® certification training preps you to successfully pass the CS0-003 exam & be ready to meet advanced persistent threats head on.
CS0-002, CS0002, CS0-003, CS0003, plus, cysaplus, 8140/8570, 8140, 8570, CompTIA, CySA+, certification, training, exam, cybersecurity, analyst, APTs, scenario-based, foundational, knowledge, network security, tools, techniques, threats, DoD, directive, Technical, IAT, Level-II, CSSP, Auditor, Infrastructure, Support, Incident Responder, comptia, cysa, analyist, csa+, CySA, certification, traning, exame, cyber security, aps, networksecutriy, dirctive, technicall, cspp, infustracture, insident, responser, plus, cysaplus, CompTIA CySA+, cybersecurity analyst, APTs, scenario-based training, CS0-002, intermediate certification, Network+, CASP, analytical approach, network security, tools, techniques, threats, U.S. DoD Directive 8140/8570.01, Technical IAT Level-II, CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, CSSP Auditor, CompTIA CySA, cyber security analyst, advanced persistent threads, scenario based training, network security tools and tecniques. CompTIA CySA+, cybersäkerhetsanalytiker, APT er, scenario-baserad träning, CS0-002, mellanliggande certifiering, Network+, CASP, analytiskt tillvägagångssätt, nätverkssäkerhet, verktyg, tekniker, hot, U.S. DoD Directive 8140/8570.01, Teknisk IAT Nivå-II, CSSP-analytiker, CSSP-infrastrukturstöd, CSSP-incidenthanterare, CSSP-revisor, stavfel CompTIA CySA, cybersäkerhetsanalytiker, avancerade ihållande trådar, scenario-baserad träning, nätverkssäkerhetsverktyg och tekniker.
Intermediate5 daysOnline or In-classStarts from 36 330 kr -
CertNexus
Get certified in CyberSec First Response with CertNexus. Learn to detect, analyze, and respond to network threats for the new CFR-410 exam.
CyberSec, first responder, certification, training, IT professionals, analyse, threats, secure networks, problem-solving, protect, organisation, detect, respond, knowledge, practical skills, recover, attacks, potential threats, CFR, exam, U.S. DoD Directive 8140/8570.01, CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, CSSP Auditor, Cybersick, first responser, certifacation, traning, IT profeshionals, analize, threts, secur, netwroks, problum-solvin, pritect, orginization, detct, knoledge, pratical skills, recovr, attaks, potenshal threts. CyberSec, förstasvarande, certifiering, träning, IT-professionella, analys, hot, säkra nätverk, problemlösning, skydda, organisation, upptäcka, reagera, kunskap, praktiska färdigheter, återhämtning, attacker, potentiella hot, CFR, examen, U.S. DoD Directive 8140/8570.01, CSSP-analytiker, CSSP-infrastrukturstöd, CSSP-incidentresponder, CSSP-revisor, stavfel Cybersick, första responser, certifacation, traning, IT-profeshionals, analize, threts, secur, netwroks, problum-solvin, pritect, orginization, detct, knoledge, pratical skills, recovr, attaks, potenshal threts.
Intermediate5 daysOnline or In-classStarts from 34 930 kr -
Learn to defend your organisation from cyber attacks and protect your data with our course on securing communications and information.
Defending the Perimeter, Cyber Attacks, Training, confidentiality, integrity, availability, organization, information, communications, data, security principles, secure firewalls, Virtual Private Network, VPN, network perimeter, malicious attacks, TCP/IP, client server architecture Defending the Perimiter, Cyper Attacks, Trainning, confidenciality, integrety, availibility, organisiation, comunications, secruity principles, secure firewals, Virtual Privite Network, netwrok perimeter, malitious attacks, TCP/IP, client-server architechture. Försvar av Perimetern, Cyberattacker, Träning, konfidentialitet, integritet, tillgänglighet, organisation, information, kommunikation, data, säkerhetsprinciper, säkra brandväggar, Virtuellt Privat Nätverk, VPN, nätverksperimeter, skadliga attacker, TCP/IP, klient-serverarkitektur. Felstavningar Försvar av Perimiter, Cyperattacker, Tränning, konfidensialitet, integritet, tillgänglighet, organisation, kommunikationer, säkrutetsprinciper, säkra brandväggar, Virtuellt Privat Nätverk, nätverksperimiter, maliciösa attacker, TCP/IP, klient-serverarkitektur.
Intermediate4 daysOnline or In-classStarts from 32 130 kr -
Learning Tree
In this Introduction to Cybersecurity course, you'll learn to assess your environment, identify needs & enumerate critical elements of security awareness.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, Introduction, Cyber Security, Starter Guide, training course, protect, organisation, social engineering attacks, cyber threats, disaster recovery, continuity of operations, awareness course, establish security, assessing environment, identifying needs, deficits, critical elements, security awareness, prior experience, cyber secutiry, secruity, awarness, enviroment, deficits Introduktion, Cybersäkerhet, Startguide, utbildningskurs, skydda, organisation, sociala ingenjörsattacker, cybersäkerhetshot, katastrofåterhämtning, kontinuitet i verksamheten, medvetenhetsträning, etablera säkerhet, utvärdera miljön, identifiera behov, brister, kritiska element, säkerhetsmedvetenhet, tidigare erfarenhet, cyber säkerhet, säkerhet, medvetenhet, miljö, brister.
Foundation1 dayOnline or In-classStarts from 7 700 kr -
Learning Tree
In this Vulnerability Assessment course, you learn how to create a network security vulnerability assessment checklist to prevent network exploitation.
Vulnerability Assessment, Network security, Security breaches, Risk evaluation, Infrastructure exposure, Server vulnerabilities, Desktop vulnerabilities, Reports interpretation, Vulnerability scanners, Points of exposure, Network exploitation, Misconfigurations, Security weaknesses, Risk management, Vulnerability testing, Penetration testing, Cybersecurity assessment, Threat assessment, Security audit, Security analysis, Risk assessment, Security assessment, Vulnerability management, Vulnerability identification, Security scanning, Security testing, Security evaluation, Vulnerability scanning, Security inspection, Security review, Security check, Vulnerability analysis, Security consulting, Security services, Vulnerability prevention, Security solutions, Security measures, Security controls, Security best practices, Security guidelines, Security protocols, Security standards, Security policies, Security procedures, Security training, Security awareness. Vulnerabilty, Assesment, Netwrok, Breaches, Evalution, Infrastucture, Vunerabilities, Interpratation, Scanners, Exploitation, Misconfigrations, Weakneses, Managment, Penetration, Cyberscurity, Threath, Audt, Analyis, Inspecton, Reviw, Chek, Consuting, Servies, Prevetion, Soluions, Measurs, Contols, Guidlines, Proctocols, Stanards, Polices, Procedurs, trining, Awarness. Sårbarhetsbedömning, Nätverkssäkerhet, Säkerhetsintrång, Riskbedömning, Infrastruktursårbarhet, Server sårbarheter, Skrivbordssårbarheter, Rapporttolkning, Sårbarhetsskannrar, Exponeringspunkter, Nätverksutnyttjande, Felkonfigurationer, Säkerhetssvagheter, Riskhantering, Sårbarhetstestning, Penetrationstestning, Cybersäkerhetsbedömning, Hotbedömning, Säkerhetsrevision, Säkerhetsanalys, Riskbedömning, Säkerhetsbedömning, Sårbarhetshantering, Identifiering av sårbarheter, Säkerhetsskanning, Säkerhetstestning, Säkerhetsutvärdering, Sårbarhetsskanning, Säkerhetsinspektion, Säkerhetsgranskning, Säkerhetskontroll, Sårbarhetsanalys, Säkerhetskonsultation, Säkerhetstjänster, Sårbarhetsförebyggande, Säkerhetslösningar, Säkerhetsåtgärder, Säkerhetskontroller, Säkerhetsbästa praxis, Säkerhetsriktlinjer, Säkerhetsprotokoll, Säkerhetsstandarder, Säkerhetspolicy, Säkerhetsprocedurer, Säkerhetsträning, Säkerhetsmedvetenhet. Sårbarhet, Bedömning, Nätverk, Intrång, Utvärdering, Infrastruktur, Sårbarheter, Tolkning, Skannrar, Exponeringspunkter, Nätverksutnyttjande, Felkonfigurationer, Svagheter, Hantering, Testning, Penetration, Cybersäkerhet, Hotbedömning, Revision, Analys, Inspektion, Granskning, Kontroll, Analys, Konsultation, Tjänster, Förebyggande, Lösningar, Åtgärder, Kontroller, Bästa praxis, Riktlinjer, Protokoll, Standarder, Policy, Procedurer, Träning, Medvetenhet.
Intermediate4 daysOnline or In-classStarts from 30 750 kr -
Learning Tree
This course provides a comprehensive introduction to zero trust concepts, principles, and deployment models.
Zero Trust Architecture, Training, Delivery Methods, Online, Training Information, Course Benefits, Understand, Limitations, Traditional Network Security, Core Concepts, Guiding Tenets, Reference Models, NIST 800-207, Key Technologies, Micro-Segmentation, Software-Defined Perimeters, Multi-Factor Authentication, Continuous Authorisation, Use Cases, Applications, Data, Infrastructure, People, Deployment, Adoption, Maintenance, Training Prerequisites, Enterprise Security Concepts, Network Infrastructure, Authentication, Access Controls, Training Outline, Fundamentals, Definition, Protections, Design Principles, Discover, Users, Devices, Cloud Asset API, Identities, AWS, IAM Dashboard, IAM Access Management, Identity Life Cycle, User and Service Accounts, GCP Roles, Windows Device Security, Security Processor, Verified Access, DoD Strategy, CISA Maturity Model, Policies, Authenticate, Authorize, GCP IAM Permissions, Shielded VMs, Monitoring Strategy, BYOD, Guest Devices, Rogue Device Detection, Web Server Logs, Network Monitoring, SIEM Dashboard, Amazon CloudWatch, Monitoring User and Entity Behaviours, Determine Device and Service Health, Linux, Cloud Providers, Kubernetes, Zero Trust Achitecture, Traning, Delivey Methods, Onine, Trainin Information, Course Benifits, Undestand, Limitatins, Traditonal Network Securty, Core Concets, Guding Tenets, Referene Models, NIST 800-207, Key Tecnologies, Micro-Segmantation, Sotware-Defined Perimetres, Multi-Fator Authentication, Continuos Authorisation, Use Cases, Apllications, Dta, Infrastucture, Peple, Deployent, Adopton, Maintenace, Training Prequisites, Enterprize Security Conecpts, Netwok Infrastructure, Authntication, Acces Controls, Traning Outline, Fundmentals, Defintion, Protectons, Desing Principles, Discver, Uers, Devies, Cloud Assest API, Identites, AWZ, IAM Dashbord, IAM Acces Management, Identiy Life Cycle, User and Servce Accounts, GCP Rols, Windos Device Secrity, Security Procssor, Verifed Access, DoD Srategy, CISA Maturiy Model, Polices, Authnticate, Autorize, GCP IAM Permisions, Shelded VMs, Monitorng Strategy, BYD, Gues Devices, Roge Device Detction, Web Serve Logs, Networ Monitoring, SIEM Dashbord, Amazon ClouWatch, Monitorng User and Entiy Behaviours, Detemine Device and Servce Health, Linx, Clod Providers, Kuberetes, Zero Trust Architecture, Utbildning, Leveransmetoder, Online, Utbildningsinformation, Kursfördelar, Förstå, Begränsningar, Traditionell Nätverkssäkerhet, Grundläggande Begrepp, Styrande Principer, Referensmodeller, NIST 800-207, Nyckelteknologier, Mikrosegmentering, Mjukvarudefinierade Gränser, Flerfaktorsautentisering, Kontinuerlig Auktorisering, Användningsfall, Applikationer, Data, Infrastruktur, Människor, Implementering, Adoption, Underhåll, Förkunskapskrav för Utbildning, Företagssäkerhetskoncept, Nätverksinfrastruktur, Autentisering, Åtkomstkontroller, Utbildningsöversikt, Grundläggande, Definition, Skydd, Designprinciper, Upptäck, Användare, Enheter, Molntillgångs-API, Identiteter, AWS, IAM-instrumentbräda, IAM-Åtkomsthantering, Identitetslivscykel, Användar- och Tjänstekonton, GCP Roller, Windows Enhetssäkerhet, Säkerhetsprocessor, Verifierad Åtkomst, DoD Strategi, CISA Mognadsmodell, Policys, Autentisera, Auktorisera, GCP IAM-behörigheter, Skärmade VM, Övervakningsstrategi, BYOD, Gästenheter, Detektion av Obehöriga Enheter, Webbserversloggar, Nätverksövervakning, SIEM-instrumentbräda, Amazon CloudWatch, Övervaka Användar- och Entitetsbeteenden, Fastställa Enhetens och Tjänstens Hälsa, Linux, Molnleverantörer, Kubernetes
Intermediate1 dayOnline or In-classStarts from 9 900 kr -
Learning Tree
Master MITRE ATT&CK Framework: Learn to map threats, apply real-world scenarios, and boost cyber defenses. Essential for security pros.
MITRE ATT&CK Framework, cybersecurity training, online course, foundation of MITRE ATT&CK, matrices, tactics, techniques, data sources, mitigations, cyber threat intelligence, defensive strategies, SolarWinds attack, threat intelligence mapping, adversary behaviours, ATT&CK Navigator, supply chain attacks, threat indicators, MITRE CAR, MITRE D3FEND, defensive recommendations, prioritizing techniques, security applications, cyber attacks, real-world case studies, cybersecurity concepts, online learning, MITRE ATT&CK Framework, cybersäkerhetsträning, onlinekurs, grundläggande MITRE ATT&CK, matriser, taktiker, tekniker, datakällor, mildringar, cyberhotunderrättelse, defensiva strategier, SolarWinds-attack, kartläggning av hotunderrättelse, fiendebeteenden, ATT&CK Navigator, leverantörskedjeattacker, hotindikatorer, MITRE CAR, MITRE D3FEND, defensiva rekommendationer, prioritering av tekniker, säkerhetstillämpningar, cyberattacker, fallstudier i verkligheten, cybersäkerhetsbegrepp, e-lärande, MITER ATT&K Framewurk, cybersicurity trainin, onlien corse, foundashun of MITER ATT&K, matrises, tactiks, tekniques, data sorses, mitigashuns, cybr thret intelligens, defensiv strategis, SolarWinds atack, thret inteligence maping, adversery behavirs, ATT&K Navigater, supply chane atacks, thret indicaters, MITER CAR, MITER D3FND, defensiv recomendations, prioritizing tecniques, securty aplications, cyber ataks, real-wurld case studis, cybersicurity concepts, onlien lerning
Intermediate1 dayOnline or In-class -
ISACA
This CDPSE training course provides enterprises the ability to identify technologists who can keep the organisation compliant efficiently and cost-effectively.
CDPSE Training Course, technical privacy requirements, certification, expertise, privacy controls, systems, networks, applications, privacy by design, technology platforms, products, processes, legal professionals, compliance, IT professionals, data breaches, first-line defense, technical privacy solutions, Lead Software Engineer, Data and System Privacy, Domain Architect, Legal Care Compliance, Privacy, Security and Privacy Engineer, Privacy Solutions Architect, IT Project Manager, Privacy Data Scientist, Privacy Analyst, Lead Privacy Manager, CDPSE Training, technical privaci, privasy controls, lead software engeneer, data and system privaci, legal care complience, privaci solutions architect, IT project menager, privaci data scientest, privaci analysist, lead privaci meneger. CDPSE-utbildningskurs, tekniska integritetskrav, certifiering, expertis, integritetskontroller, system, nätverk, applikationer, integritet genom design, teknikplattformar, produkter, processer, juridiska yrkesverksamma, efterlevnad, IT-professionella, dataintrång, första försvarslinjen, tekniska integritetslösningar, ledande mjukvaruingenjör, dataoch systemintegritet, domänarkitekt, juridisk vård och efterlevnad, integritet, säkerhetsoch integritetsingenjör, integritetslösningar arkitekt, IT-projektledare, integritetsdataforskare, integritetsanalytiker, ledande integritetschef, stavfel CDPSE-utbildning, teknisk privaci, privasy-kontroller, ledande mjukvaruingenjör, data och system privaci, juridisk vård och efterlevnad, privaci-lösningar arkitekt, IT-projektledare, privaci-dataforskare, privaci-analytiker, ledande privaci-chef.
Intermediate3 daysOnline or In-classStarts from 26 110 kr -
ISC2
This CISSP® Training and Certification prep course provides in-depth training in the ISC2™ curriculum that will help prepare you to pass your CISSP exam.
CISSP TRAINING AND CERTIFICATION PREP (WITH EXAM VOUCHER), CISSP, CISSP TRAINING AND CERTIFICATION PREP, CISSP training, certification prep course, pass CISSP exam, become CISSP certified, manage security, manage risk, secure assets, design security framework, secure communication, secure networks, develop software securely, DoD Directive 8140/8570.01, IAT Level-III, IASAE Level-I, IASAE Level-II, IAM Level-II, IAM Level-III, information assurance, security architect, security engineer, cybersecurity, network security, risk management, asset protection, software security. CISSP traning, sertification prep, pass CISPP exam, become CISP certified, manag security, manag risk, secure asset, design security framewrk, secure commnication, secure netwrks, develop software securly, DoD Directive 8140/8570.01, IAT Level-3, IASAE Level-1, IASAE Level-2, IAM Level-2, IAM Level-3, information assurnace, security architech, security enginer, cybersecurity, network secruity, risk managment, asset protction, software secruity. CISSP-utbildning, certifieringsförberedande kurs, klara CISSP-examen, bli CISSP-certifierad, hantera säkerhet, hantera risker, skydda tillgångar, designa säkerhetsramverk, säkra kommunikationer, säkra nätverk, utveckla programvara säkert, DoD Directive 8140/8570.01, IAT-nivå III, IASAE-nivå I, IASAE-nivå II, IAM-nivå II, IAM-nivå III, informationssäkerhet, säkerhetsarkitekt, säkerhetsingenjör, cybersäkerhet, nätverkssäkerhet, riskhantering, tillgångsskydd, programvarusäkerhet. Vanliga felstavningar CISSP traning, sertification prep, pass CISPP exam, bli CISP-certifierad, manag security, manag risk, secure asset, design security framewrk, secure commnication, secure netwrks, develop software securly, DoD Directive 8140/8570.01, IAT Level-3, IASAE Level-1, IASAE Level-2, IAM Level-2, IAM Level-3, information assurnace, security architech, security enginer, cybersecurity, network secruity, risk managment, asset protction, software secruity.
Intermediate5 daysOnline or In-classStarts from 41 930 kr -
Learning Tree
2014, cybersecurity, risk management, supply chain, critical suppliers, third-party relationships, fourth-party relationships, mitigation strategies, hardware risks, software risks, service risks, cyber risk, monitoring cyber risk, analyzing cyber risk, treating cyber risk, cybersecutiry, risk managment, suply chain, critcal suppliers, third party relationships, fourth party relationships, mitgation strategies, hardwar risks, software risks, service risks, cyber risck, monitring cyber risk, analysing cyber risk, treating cyber risk. cybersäkerhet, riskhantering, leverantörskedja, kritiska leverantörer, tredjepartsrelationer, fjärdepartsrelationer, riskminskningsstrategier, hårdvarurisker, mjukvarurisker, tjänsterisker, cyber risk, övervakning av cyber risk, analys av cyber risk, behandling av cyber risk, stavfel cybersäkerhet, riskhantering, leverantörskedja, kritiska leverantörer, tredjepartsrelationer, fjärdepartsrelationer, riskminskningsstrategier, hårdvarurisker, mjukvarurisker, tjänsterisker, cyber risk, övervakning av cyber risk, analys av cyber risk, behandling av cyber risk.
Intermediate2 daysOnline or In-classStarts from 20 930 kr -
EC-Council
This CCISO Certification course from EC-Council focuses on applying information security management principles & preps you to pass the CCISO exam.
Certified CISO, CCISO, information security executives, executive management, information security management principles, aspiring CISO, seasoned professionals, knowledge transfer, developing and maintaining successful information security program, ISACA certification requirements, CISM Certification Exam, U.S. DoD Directive 8140/8570.01 Management, IAM Level-II, IAM Level-III, CSSP Manager, siso, ciso, cciso, certifeid ciso, information secuirty, execuitive management, aspring ciso, ISAC certification, CISM Certifcation Exam, DoD directive 8140/8570.01, IAM Level 2, IAM Level 3, CSSP Manger. Certifierad CISO, CCISO, informationsäkerhetschefer, verkställande ledning, principer för informationsäkerhetsledning, aspirerande CISO, erfarna yrkesverksamma, kunskapsöverföring, utveckling och upprätthållande av framgångsrika informations-säkerhetsprogram, ISACA-certifieringskrav, CISM-certifieringsexamen, U.S. DoD Directive 8140/8570.01 Management, IAM Level-II, IAM Level-III, CSSP Manager, stavfel siso, ciso, cciso, certifeid ciso, information secuirty, execuitive management, aspring ciso, ISAC-certifiering, CISM Certifcation Exam, DoD direktiv 8140/8570.01, IAM Level 2, IAM Level 3, CSSP Manger.
Advanced5 daysOnline or In-classOn-Demand -
ISC2
This CGRC® training and certification course prepares you for the CGRC exam plus risk management frameworks.
CGRC, Certified in Governance, Risk and Compliance, CAP, Certified Authorization Professional, information security, security risk management, information system authorization, legal requirements, regulatory requirements, CAP Certification Exam, U.S. DoD Directive 8140/8570.01, IAM Level-I, IAM Level-II, training, certification, exam, modules, prerequisites, delivery, CGR, CGR certification, Certified in Governance, Risk and Complience CGRC, Certifierad i Governance, Risk och Compliance, CAP, Certifierad Behörighetsprofessionell, informationssäkerhet, säkerhetsriskhantering, informationssystembehörighet, lagkrav, regleringskrav, CAP-certifieringsexamen, U.S. DoD-direktiv 8140/8570.01, IAM-nivå I, IAM-nivå II, utbildning, certifiering, examen, moduler, förkunskapskrav, leverans, stavfel CGR, CGR-certifiering, Certifierad i Governance, Risk och Compliance.
Foundation5 daysOnline or In-classStarts from 34 930 kr -
ISACA
In this course, you will gain the knowledge needed to successfully pass the certification exam and become a CISM, ISACA Certified Information Security Manager.
CISM, Certified Information Security Manager, certification exam, security governance, risk management, compliance, security program development, management, security incident management, CAP certification exam, DoD Directive 8140/8570.01, IAM Level-I, IAM Level-II, CISIM, CISM certification, Information Security Manager certification, security goverance, risk managment, complience, security program development and managment, security incident managment, CAP certification, DoD Directive 8140/8570.01, IAM Level 1, IAM Level 2. CISM, Certified Information Security Manager, certifieringsexamen, säkerhetsstyrning, riskhantering, efterlevnad, utveckling av säkerhetsprogram, ledning, hantering av säkerhetsincidenter, CAP certifieringsexamen, DoD Directive 8140/8570.01, IAM Level-I, IAM Level-II, stavfel CISIM, CISM certifiering, certifiering som informations säkerhetschef, säkerhetsstyrning, riskhantering, efterlevnad, utveckling och hantering av säkerhetsprogram, hantering av säkerhetsincidenter, CAP certifiering, DoD Directive 8140/8570.01, IAM Level 1, IAM Level 2.
Intermediate4 daysOnline or In-classStarts from 34 930 kr -
ISACA
Get certified with our CISA training course! Covers all 5 domains on the exam, meets DoD Directive 8140/8570.01 requirements.
CISA (CERTIFIED INFORMATION SYSTEMS AUDITOR), CERTIFIED INFORMATION SYSTEMS AUDITOR), CISA CERTIFIED INFORMATION SYSTEMS AUDITOR, ISACA, CISA, Certified Information Systems Auditor, information systems auditing, control, information security, IT governance, management of IT, information systems acquisition, development, implementation, operations, maintenance, support, protection of information assets, U.S. DoD Directive 8140/8570.01, Technical IAT Level-III, CSSP Auditor, CISCA, CIZA, CISA certification, information system audit, IT management, information systems acquistion, information systems operation, information assets protection. ISACA, CISA, Certified Information Systems Auditor, revision av informationssystem, kontroll, informationssäkerhet, IT-styrning, hantering av IT, förvärv, utveckling, implementering, drift, underhåll, stöd, skydd av informationsresurser, U.S. DoD Directive 8140/8570.01, Teknisk IAT Nivå-III, CSSP-revisor, stavfel CISCA, CIZA, CISA-certifiering, revision av informationssystem, IT-hantering, förvärv av informationssystem, drift av informationssystem, skydd av informationsresurser.
Intermediate4 daysOnline or In-classStarts from 34 930 kr -
ISACA
This official ISACA CRISC training course helps you prepare for the certification exam & provides you with in-depth coverage of the four CRISC domains.
ISACA, certification, CRISC, training, risk identification, IT risk assessment, risk response, mitigation, risk and control monitoring, reporting, enterprise risk management, IT professional, risk and control professional, business analyst, project manager, compliance professional, defend, protect, future-proof, exam, experience, risk management, IS control, prep course, exam candidate information guide, rules, exam dates, deadlines, ISCA, CRIC, risk managment, control professional, buisness analyst, project manger, compliance profesional ISACA, certifiering, CRISC, utbildning, riskidentifiering, IT-riskbedömning, riskrespons, riskreducering, riskoch kontrollövervakning, rapportering, företagsriskhantering, IT-professionell, riskoch kontrollprofessionell, affärsanalytiker, projektledare, efterlevnadsprofessionell, försvara, skydda, framtidssäkra, examen, erfarenhet, riskhantering, IS-kontroll, förberedelsekurs, examenskandidatinformationsguide, regler, examensdatum, deadlines, stavfel ISCA, CRIC, riskhantering, kontrollprofessionell, affärsanalytiker, projektledare, efterlevnadsprofessionell.
Intermediate4 daysOnline or In-classStarts from 34 930 kr -
Learning Tree
This Cyber Security Risk Assessment Training course teaches how to protect your organisation by employing a standards-based risk management process.
cybersecurity, risk assessment, training, security, organisation, laws, regulations, compliance, assessment plan, standards-based, risk management, satisfactory security posture, cyber security, risk assesment, tranning, orginization, complience, assessment, plan, risk managment cybersäkerhet, riskbedömning, utbildning, säkerhet, organisation, lagar, regler, efterlevnad, bedömningsplan, standardbaserad, riskhantering, tillfredsställande säkerhetsläge, cybersäkerhet, riskbedömning, träning, organisation, efterlevnad, bedömning, plan, riskhantering.
Foundation4 daysOnline or In-classStarts from 32 130 kr -
Learning Tree
This Cyber Security Success Factors course provides an introduction to the 4 pillars of cyber security. Examine real cyber attacks & their countermeasures.
cyber security, security training, success factors, countermeasures, network passwords, digital signatures, encryption, network authentication, open source tools, real cyber attacks, data integrity, confidentiality, cybersecurity, security, training, success, factors, counter measures, network, pass words, digital signature, encrypt, authentication, open-source tools, real cybersecurity, data integrity, confidentiality cybersäkerhet, säkerhetsträning, framgångsfaktorer, motåtgärder, nätverkslösenord, digitala signaturer, kryptering, nätverksautentisering, öppen källkod, verkliga cyberattacker, dataintegritet, konfidentialitet, cybersäkerhet, säkerhet, träning, framgång, faktorer, motåtgärder, nätverk, lösenord, digital signatur, kryptera, autentisering, öppen källkod, verklig cybersäkerhet, dataintegritet, konfidentialitet.
Foundation1 dayTeam Training -
ISC2
This SSCP® training and certification course prepares you to pass the exam and become a Systems Security Certified Practitioner.
SSCP, SSC, SSCPT, 8140/8570, 8140, 8570, SSCP, certification, course, exam, Systems Security Certified Practitioner, skills, concepts, domains, Access Controls, Security Operations, Administration, Incident Response, Cryptography, Network Security, DoD, Directive 8140, 8570.01, Technical, IAT, CSSP, Infrastructure, training, prepare, pass, official, ISC ², U.S., United Statesmay vary
Foundation5 daysOnline or In-classStarts from 34 930 kr -
Microsoft
Prepare to design and evaluate cybersecurity strategies in Zero Trust, GRC, SecOps, and data with our Microsoft Cybersecurity Architect (SC-100) course.
SC100, Microsoft, Cybersecurity, Architect, course, design, evaluate, strategies, Zero Trust, Governance Risk Compliance, GRC, security operations, SecOps, data, applications, solutions, specify, requirements, cloud infrastructure, service models, SaaS, PaaS, IaaS, Microssoft, Cybersescurity, Archtect, Zerro Trsut, Govenrance Risk Complience, Secuity Oprations, Aaplcations, Slnutions, cloud infrasturcture, misplelling, IAS, SC100, cybersecurity, architect, SC-100, course, design, evaluate, strategies, Zero Trust, Governance Risk Compliance, GRC, security operations, SecOps, data, applications, solutions, cloud infrastructure, service models, SaaS, PaaS, IaaS, specify, requirements, Microsoft, cyberscurity, architekt, SC100, strategeis, Zer Trust, Govenance Risk Compliance, SecOps, infrastrcture, Serivce models, Saas, PaaS, Iaas. cybersäkerhet, arkitekt, SC-100, kurs, design, utvärdera, strategier, Zero Trust, Governance Risk Compliance, GRC, säkerhetsoperationer, SecOps, data, applikationer, lösningar, molninfrastruktur, tjänstemodeller, SaaS, PaaS, IaaS, specificera, krav, Microsoft, stavfel cyberscurity, architekt, SC100, strategeis, Zer Trust, Govenance Risk Compliance, SecOps, infrastrcture, Serivce models, Saas, PaaS, Iaas.
Advanced4 daysOnline or In-classStarts from 30 730 kr -
CertNexus
Prepare for the CSC-210 exam with this CertNexus Cyber Secure Coder certification training course.
CertNexus, Cyber Secure Coder, software security, development teams, code, delivery, software quality, privacy issues, software development lifecycle, vulnerabilities, remediate, security defects, misconfiguration, design software, human element, incorporate security, CertNexus CSC-210 exam, Cert Nexus, Cyber Secure Corder, sofware security, developement teams, desing software CertNexus, Cyber Secure Coder, mjukvarusäkerhet, utvecklingsteam, kod, leverans, mjukvarukvalitet, integritetsproblem, mjukvaruutvecklingslivscykel, sårbarheter, åtgärda, säkerhetsdefekter, felkonfiguration, designa mjukvara, mänskligt element, integrera säkerhet, CertNexus CSC-210-examen, stavfel Cert Nexus, Cyber Secure Corder, sofware security, developement teams, desing software.
Intermediate3 daysTeam Training -
ISC2
This CSSLP® Training and Certification course provides you with in-depth coverage of the skills and concepts of the eight domains of software security.
CSSLP, CSSLP certification, software security, secure software development, software concepts, requirements, design, implementation, testing, lifecycle management, DoD Directive 8140, 8570.01, Information Assurance Security Architect/Engineer, IASAE, Level-I, Level-II, training, certification, ISC ², CSSLP certifcation, sofware security, secur software development, softwre concepts, requirments, desing, implementaion, testing, lifecyle management, DoD Directive 8140/8570.01, Infrmation Assurance Security Architect/Engineer, IASAE, Level-1, Level-2. CSSLP, CSSLP-certifiering, mjukvarusäkerhet, säker mjukvaruutveckling, mjukvarukoncept, krav, design, implementation, testning, livscykelhantering, DoD-direktiv 8140, 8570.01, Information Assurance Security Architect/Engineer, IASAE, Nivå-I, Nivå-II, utbildning, certifiering, ISC ², stavfel CSSLP-certifcation, sofware-säkerhet, secur mjukvaruutveckling, softwre-koncept, requirments, desing, implementaion, testning, lifecyle-hantering, DoD-direktiv 8140/8570.01, Infrmation Assurance Security Architect/Engineer, IASAE, Nivå-1, Nivå-2.
Intermediate5 daysOnline or In-classStarts from 40 530 kr -
DevOps Institute
This SecDevOps Practitioner® (SDOP) Certification course builds on foundational SecDevOps knowledge while providing practical, hands-on experience.
SecDevOps, SDOP, certification, training, foundational practice, SDOF, techniques, pipeline architecture, team, best-practice processes, implementation, comprehensive understanding, optimum outcomes, practitioner-level class, SecDevOp, SDOPs, certificatoin, traning, foundtional, SDOFs, technqiues, pipline, arhictecture, teem, best-practice proccesses SecDevOps, SDOP, certifiering, utbildning, grundläggande praxis, SDOF, tekniker, pipeline-arkitektur, team, bästa praxis-processer, implementering, omfattande förståelse, optimala resultat, praktiker-nivå klass, stavfel SecDevOp, SDOPs, certificatoin, traning, foundtional, SDOFs, technqiues, pipline, arhictecture, teem, bästa praxis-processer.
Intermediate2 daysOnline or In-classStarts from 18 130 kr -
ISC2
Get ISC2 Certified in Cybersecurity (CC) for entry-level to advanced certs & leadership roles. No experience needed.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, Certified in Cybersecurity, CC, entry-level certification, workforce gap, opportunities, field, candidates, recent graduates, career changers, IT professionals, advanced cybersecurity certifications, CISSP, Certified Information Systems Security Professional, Security+, leadership roles, Cyber-security, sertified, siberscurity, CC certification, information security certification. Certifierad inom cybersäkerhet, CC, grundläggande certifiering, arbetskraftsgap, möjligheter, område, kandidater, nyligen utexaminerade, karriärbytare, IT-proffs, avancerade cybersäkerhetscertifieringar, CISSP, Certified Information Systems Security Professional, Security+, ledarskapsroller, stavfel Cyber-säkerhet, certifierad, sibersäkerhet, CC-certifiering, informationssäkerhetscertifiering.
Foundation1 dayOnline or In-classStarts from 11 130 kr -
Cisco
Learning Tree's SCOR training helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles.
Implementing and Operating Cisco Security Core Technologies, SCOR Course Outline, Cisco CCNP Security, Cisco CCIE Security, cybersecurity attacks, security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements, Cisco Firepower Next-Generation Firewall, Cisco ASA Firewall, access control policies, mail policies, 802.1X Authentication, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, threat detection features, Implementing and Administering Cisco Solutions, Ethernet, TCP/IP networking, Windows operating system, Cisco IOS networking, networking security concepts, Security Engineer, Network Engineer, Network Designer, Network Administrator, Systems Engineer, Consulting Systems Engineer, Technical Solutions Architect, Cisco Integrators/Partners, Network Manager, Cisco integrators, partners, professional-level security job roles, expert-level security job roles, CCNP Security. Implementing and Operating Cisco Security Core Technologies SCOR Training, Cisco CCNP Security, Cisco CCIE Security, cybersecurity attacks, security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements, Cisco Firepower Next-Generation Firewall, Cisco ASA Firewall, access control policies, mail policies, 802.1X Authentication, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, threat detection features, Implementing and Administering Cisco Solutions, Ethernet, TCP/IP networking, Windows operating system, Cisco IOS networking, networking security concepts, Security Engineer, Network Engineer, Network Designer, Network Administrator, Systems Engineer, Consulting Systems Engineer, Technical Solutions Architect, Cisco Integrators/Partners, Network Manager, Cisco integrators, partners, professional-level security job roles, expert-level security job roles, CCNP Security. Implementering och drift av Cisco Security Core Technologies, SCOR Kursöversikt, Cisco CCNP Security, Cisco CCIE Security, cybersäkerhetsattacker, säkerhet för nätverk, moln och innehåll, endpoint-skydd, säker nätverksåtkomst, synlighet och verkställighet, Cisco Firepower Next-Generation Firewall, Cisco ASA Firewall, åtkomstkontrollpolicyer, e-postpolicyer, 802.1X-autentisering, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, hotdetektionsfunktioner, Implementering och administrering av Cisco-lösningar, Ethernet, TCP/IP-nätverk, Windows-operativsystem, Cisco IOS-nätverk, nätverkssäkerhetskoncept, säkerhetsingenjör, nätverksingenjör, nätverksdesigner, nätverksadministratör, systemingenjör, konsulterande systemingenjör, teknisk lösningarkitekt, Cisco-integratörer/partners, nätverkschef, Cisco-integratörer, partners, säkerhetsjobb på professionell nivå, säkerhetsjobb på expertnivå, CCNP Security. Implementering och drift av Cisco Security Core Technologies SCOR Utbildning, Cisco CCNP Security, Cisco CCIE Security, cybersäkerhetsattacker, säkerhet för nätverk, moln och innehåll, endpoint-skydd, säker nätverksåtkomst, synlighet och verkställighet, Cisco Firepower Next-Generation Firewall, Cisco ASA Firewall, åtkomstkontrollpolicyer, e-postpolicyer, 802.1X-autentisering, Cisco Stealthwatch Enterprise, Cisco Stealthwatch Cloud, hotdetektionsfunktioner, Implementering och administrering av Cisco-lösningar, Ethernet, TCP/IP-nätverk, Windows-operativsystem, Cisco IOS-nätverk, nätverkssäkerhetskoncept, säkerhetsingenjör, nätverksingenjör, nätverksdesigner, nätverksadministratör,
Intermediate5 daysOnline or In-classStarts from 46 130 kr -
Enroll in Securing Email w/ Cisco Email Security. Prep for exam 300-710 & earn CCNP Security & Cisco Cert Specialist - Network Security Firepower.
Securing Networks, Cisco Firepower, Threat Defence, NGFW, NGIPS, Network Address Translation, VPN, SSL decryption, CCNP Security, Network Security Firepower, TCP/IP networking, firewall, IPS, security administrators, security consultants, network administrators, system engineers, technical support personnel, channel partners, resellers. Securing Network Cisco Fire Power Threat Defense NGFV NGIPS VPNs SSL decryption CCNP Securities Network Security Fire Power TCP/IP network fire wall IP security security administrator security consultant network administrator system engineer technical support personal channel partner reseller Säkerställa nätverk, Cisco Firepower, Hotförsvar, NGFW, NGIPS, Nätverksadressöversättning, VPN, SSL-dekryptering, CCNP Security, Nätverkssäkerhet Firepower, TCP/IP-nätverk, brandvägg, IPS, säkerhetsadministratörer, säkerhetskonsulter, nätverksadministratörer, systemingenjörer, teknisk supportpersonal, kanalpartners, återförsäljare. Säkerställa nätverk Cisco Fire Power Hotförsvar NGFV NGIPS VPN er SSL-dekryptering CCNP Securities Nätverkssäkerhet Fire Power TCP/IP-nätverk brandvägg IP-säkerhet säkerhetsadministratör säkerhetskonsult nätverksadministratör systemingenjör teknisk supportpersonal kanalpartner återförsäljare.
Online or In-classStarts from 46 130 kr -
Learning Tree
The Information Security Training provides the knowledge and skills to analyse and assess network risks, then select & deploy appropriate countermeasures.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, Information Security, Security Training, Cybersecurity, Network Security, Risk Analysis, Risk Assessment, Countermeasures, Security Measures, Security Protocols, Information Protection, Data Security, Security Awareness, Security Education, Security Certification, Security Compliance, Security Policies, Security Standards, Security Best Practices, Security Guidelines, Security Frameworks, Security Controls, Security Auditing, Security Testing, Security Management, Security Governance, Security Architecture, Security Operations, Security Incident Response, Security Investigations, Security Forensics, Security Consulting, Security Services, Security Solutions, Security Products, Security Technologies, Security Trends, Security News, Security Blogs, Security Forums, Security Communities, Security Events, Security Conferences, Security Webinars, Security Training Courses, Security Certifications, Security Exams, Security Jobs, Security Careers, Security Professionals, Security Experts, Security Researchers, Security Analysts, Security Consultants, Security Managers, Security Directors, Security Officers, Security Administrators, Security Engineers, Security Developers, Security Architects, Security Auditors, Security Testers, Security Trainers, Security Mentors, Security Coaches, Security Advocates, Security Enthusiasts, Security Fans, Security Followers, Security Users, Security Customers, Security Partners, Security Vendors, Security Suppliers, Security Providers, Security Agencies, Security Organizations, Security Associations, Security Networks, Security Alliances, Security Collaborations, Security Partnerships, Security Cooperations, Security Synergies, Security Relationships, Security Connections, Security Interactions, Security Communications, Security Feedback, Security Suggestions, Security Improvements, Security Enhancements, Security Innovations, Security Discoveries, Security Inventions, Security Breakthroughs, Security Advancements, Security Achievements, Security Milestones, Security Successes, Security Challenges, Security Risks, Security Threats, Security Vulnerabilities, Security Attacks, Security Breaches, Security Incidents, Security Emergencies, Security Disasters, Security Crises, Security Contingencies, Security Plans, Security Strategies, Security Tactics, Security Procedures, Security Guidelines, Security Checklists, Security Templates, Security Forms, Security Manuals, Security Guides, Security Books, Security Videos, Security Presentations, Security Webinars, Security Workshops, Security Seminars, Security Conferences, Security Events, Security Meetups, Security Forums, Security Communities, Security Groups, Security Teams, Security Projects, Security Programs, Security Initiatives, Security Campaigns, Security Movements, Security Advocacy, Security Activism, Security Awareness, Security Education, Security Training, Security Certification, Security Compliance, Security Governance, Security Management, Security Leadership, Security Culture, Security Ethics, Security Values, Security Principles, Security Standards, Security Best Practices, Security Innovations, Security Technologies, Security Solutions, Security Products, Security Services, Security Informationssäkerhet, Säkerhetsträning, Cybersäkerhet, Nätverkssäkerhet, Riskanalys, Riskbedömning, Motåtgärder, Säkerhetsåtgärder, Säkerhetsprotokoll, Informationsskydd, Dataskydd, Säkerhetsmedvetenhet, Säkerhetsutbildning, Säkerhetscertifiering, Säkerhetskonformitet, Säkerhetspolicyer, Säkerhetsstandarder, Säkerhetsbästa praxis, Säkerhetsriktlinjer, Säkerhetsramverk, Säkerhetskontroller, Säkerhetsrevision, Säkerhetstestning, Säkerhetsledning, Säkerhetsstyrning, Säkerhetsarkitektur, Säkerhetsoperationer, Säkerhetsincidenthantering, Säkerhetsutredningar, Säkerhetsforensik, Säkerhetskonsultation, Säkerhetstjänster, Säkerhetslösningar, Säkerhetsprodukter, Säkerhetsteknologier, Säkerhetstrender, Säkerhetsnyheter, Säkerhetsbloggar, Säkerhetsforum, Säkerhetsgemenskaper, Säkerhetsevenemang, Säkerhetskonferenser, Säkerhetswebbinarier, Säkerhetsträningskurser, Säkerhetscertifieringar, Säkerhetsprov, Säkerhetsjobb, Säkerhetskarriärer, Säkerhetsproffs, Säkerhetsexperter, Säkerhetsforskare, Säkerhetsanalytiker, Säkerhetskonsulter, Säkerhetschefer, Säkerhetsdirektörer, Säkerhetspersonal, Säkerhetsadministratörer, Säkerhetsingenjörer, Säkerhetsutvecklare,
Foundation4 daysOnline or In-classStarts from 32 130 kr -
CompTIA
This CompTIA Security+® certification course prepares you for the CompTIA SY0-601 exam & ensures compliance & secures your organisation.
securityplus, plus, CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, comptia security + 8140 446 466 CompTIA Security+, course, certification, exam, vendor-neutral, information system security, best practices, knowledge, systems, network security, network infrastructure, access control, assessments, audits, cryptography, organizational security, passing, U.S. DoD Directive 8140/8570.01, Technical IAT Level-II, Management IAM Level-I, requirements, comptia, secutiry, ssecurity, sy, vendor-neutral, best-practises, assesments, crytography, organizatonal. CompTIA Security+, kurs, certifiering, examen, leverantörsneutral, informationssystemssäkerhet, bästa praxis, kunskap, system, nätverkssäkerhet, nätverksinfrastruktur, åtkomstkontroll, bedömningar, revisioner, kryptografi, organisatorisk säkerhet, godkännande, U.S. DoD Directive 8140/8570.01, teknisk IAT nivå-II, ledning IAM nivå-I, krav, stavfel comptia, secutiry, ssecurity, sy, leverantörsneutral, bästa praxis, bedömningar, kryptografi, organisatorisk.
Intermediate5 daysOnline or In-classPremiumBundleStarts from 11 950 kr -
EC-Council
Validate your cybersecurity skills with the C|CT Certification in network defense, ethical hacking, digital forensics, and security operations.
CYBERSECURITY FOUNDATIONS, CYBER SECURITY FOUNDATION, CYBER, CYBER SECURITY FOUNDATIONS, CYBERSECURITY FOUNDATION, CYBERSECURITY INTRO, CYBERSECURITY INTRODUCTION, CYBER SECURITY INTRO, CYBER SECURITY INTRODUCTION, Cybersecurity, technician, certification, program, entry-level, skills, network defense, ethical hacking, digital forensics, security operations, validate, foundational, domains, increasing need, C|CT, EC-Council, cybersecurity cyber security , technician technitian , certification certifcation , ethical hacking ethical hackng , digital forensics digital forensices , security operations security oprations Cybersäkerhet, tekniker, certifiering, program, instegsnivå, färdigheter, nätverksförsvar, etiskt hackande, digital forensik, säkerhetsoperationer, validera, grundläggande, domäner, ökande behov, C|CT, EC-Council, stavfel cybersäkerhet cyber säkerhet , tekniker teknitian , certifiering certifcation , etiskt hackande etiskt hackng , digital forensik digital forensices , säkerhetsoperationer säkerhets oprations .
Foundation5 daysOnline or In-classStarts from 31 140 kr -
EC-Council
In this Certified Network Defender (CND) training course, you will get prepped to pass the EC-Council CND 312-38 exam and learn how to manage a secure network.
Certified Network Defender, CND, EC-Council, 312-38 exam, network security, defensive security, data security, networking technologies, defensive software, confidentiality, integrity, availability, cyber security, network administrators, enterprise network, U.S. DoD Directive 8140/8570.01, IAT Level-I, IAT Level-II, IAM Level-I, CSSP Infrastructure Support, CYBRScore Lab Bundles, Certified Net Defender, CND certification, EC Council, 31238 exam, network secutiry, cybersecutiry, network adminstrators, entreprise network. Certifierad Nätverksförsvarare, CND, EC-Council, 312-38 examen, nätverkssäkerhet, defensiv säkerhet, datasäkerhet, nätverksteknologier, defensiv programvara, konfidentialitet, integritet, tillgänglighet, cybersäkerhet, nätverksadministratörer, företagsnätverk, U.S. DoD Directive 8140/8570.01, IAT Level-I, IAT Level-II, IAM Level-I, CSSP Infrastructure Support, CYBRScore Lab Bundles, stavfel Certified Net Defender, CND-certifiering, EC Council, 31238 examen, nätverkssäkerhet, cybersäkerhet, nätverksadministratörer, företagsnätverk.
Intermediate5 daysOnline or In-classOn-DemandStarts from 19 200 kr -
Learning Tree
This Disaster Recovery & Business Continuity course teaches you to identify vulnerabilities and implement a Business Continuity Management System (BCMS).
disaster recovery, business continuity, training, mission-critical, continuity needs, risk, incident response team charter, Business Continuity Management System, BCMS, organisational resilience, disaster recovery plan, internal threats, external threats, ICT, Information and Communication Technology, service delivery, line management, project management, facilities, human resources, finance, disater recovery, busines continuty, tranning, misson-critical, continuty neads, risck, incident responce team charter, Business Continuty Managment System, BMCS, orgnizational resilence, disater recovery plan, intrenal threats, external threts, IT, Informtion and Communciation Technology, servce delivery, line managment, project managment, facilites, humn resources, finace. katastrofåterhämtning, affärskontinuitet, utbildning, mission-kritisk, kontinuitetsbehov, risk, incidentresponsgruppens stadgar, Business Continuity Management System, BCMS, organisatorisk motståndskraft, katastrofåterhämtningsplan, interna hot, externa hot, ICT, informationsoch kommunikationsteknik, tjänsteleverans, linjeledning, projektledning, faciliteter, personalresurser, finans, stavfel disateråterhämtning, busines kontinuty, tranning, misson-kritisk, continuty neads, risck, incidentresponsgruppens stadgar, Business Continuty Management System, BMCS, organisatorisk motståndskraft, katastrofåterhämtningsplan, interna hot, externa hot, IT, informationsoch kommunikationsteknik, tjänsteleverans, linjeledning, projektledning, faciliteter, personalresurser, finans.
Foundation4 daysOnline or In-classStarts from 32 130 kr