
Local instructor-led live Cyber Security training courses in България.
Oтзиви от потребители
Стремежът на обучение за обучение.
Ian McInally - KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Упражненията и груповите дискусии.
KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Треньорът беше много запознат и е щастлив да отиде на темпото на присъстващите. Той беше учтив и уважаван към всички, които присъстват. Чувствах се, че научих много от курса, тъй като треньорът беше много скучен в доставката му, когато минава през първите плъзгачи. Наистина, заслужава, докато се разхождате от моята лична гледна точка.
Julie Price - KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Околната среда беше наистина спокойна и отворена, така че всеки може да зададе въпроси или да постави в точки от гледна точка или опит. Дейвид Треньорът беше МСП по този въпрос, а стилът му беше много добър.
KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Вторият ден, упражнения за сценарии.
Christina Hutchings - KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Хареса ми въведението на акценто и анекдото, за да направят обучението по-реално
KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Дейвид в дълбочината на знаците. Неговите отношения изграждат умения с публиката. Наистина ми харесах начина, по който той успя да ни направи като колективна аудитория се наслаждава на доста суха и неинтераторна предмет. Той имаше анекдоти и познаване на конкретни примери за недостатъци на сигурността - хакерски атаки - BRAP "разбивки" и т.н., които поставят плът на костите на законодателството или "най-добрата практика" за БКП, която се опитва да ни научи. Наистина, ангажиране, на земята и човек, който е добър и ... един много добър слушател и страхотен, харизматичен треньор.
Cris Bollin - KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Всичко е отлично
Manar Abu Talib - Dubai Electronic Security Center
Course: MITRE ATT&CK
Machine Translated
Cyber Security Course Outlines
This is a 'Practitioner' course and leans heavily on practical exercises designed to reinforce the concepts being taught and to build the delegates' confidence in implementing business continuity management. The course is also designed to encourage debate, and the sharing of knowledge and experience between students.
Delegates will benefit from the practical and extensive experiences of ours trainers who are practicing business continuity management and ISO 22301:2012 specialists.
Delegates will learn how to:
- Explain the need for business continuity management (BCM) in all organisations
- Define the business continuity lifecycle
- Conducting business continuity programme management
- Understand their organisation sufficiently to identify mission-critical impact areas
- Determine their organisation's business continuity strategy
- Establish a business continuity response
- Exercise, maintain and review plans
- Embed business continuity in an organisation
- Define terms and definitions appropriate to business continuity
By the end of the course, delegates will have a detailed understanding of all the key components of business continuity management and be able to return to their work, making a significant contribution to the business continuity management process.
By the end of this training, participants will be able to integrate, test, protect, and analyze their web apps and services using the OWASP testing framework and tools.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
The Course is ideal for those working in positions such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
By the end of this training, participants will be able to:
- Have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication).
- Have the necessary practice to deploy and manage their own authentication server.
In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.
By the end of this training, participants will be able to:
- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server
Audience
- Network engineers
- System Administrators
- Computer technicians
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods.
By the end of this training, participants will be able to:
- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system
Audience
- Network engineers
- Developers
- System engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
By the end of this training, participants will be able to:
- Understand IoT architectures.
- Understand emerging IoT security threats and solutions.
- Implement technologies for IoT security in their organization.
In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.
By the end of this training, participants will be able to:
- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.
Audience
- Network engineers
- Cyber security professionals
- System architects
- IT managers
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
Това обучение, ръководено от инструктори, е насочено към инженери, които искат да предпазват свързаните превозни средства от кибер атаки.
В края на обучението участниците ще могат да:
Увеличаване на киберсигурността в автомобилните системи. Изберете най-подходящите технологии, инструменти и подходи.
Формат на курса
Интерактивна лекция и дискусия. Много упражнения и упражнения. Изпълнение на ръката в живо лабораторна среда.
Опции за персонализиране на курса
За да поискате персонализирано обучение за този курс, моля, свържете се с нас, за да организирате.
To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification
Target Audience:
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange
Leaders will receive information in various topics that will build their knowledge and hone executive decision-making in regard to the cybersecurity threat.
organization or who, for other reasons, wish to achieve and demonstrate a broad
understanding of the law, including the EU General Data Protection Regulation (GDPR) and
the UK Data Protection Bill and their practical application. It is recognized that those with
overall responsibility for data protection within an organization will need to develop a detailed
understanding of the law"
for industry practitioners who wish to demonstrate their professional expertise and
understanding of the PCI Data Security Standard (PCI DSS).
Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge
How does Bitcoin work?
What makes Bitcoin different?
How secure are your Bitcoins?
How anonymous are Bitcoin users?
What determines the price of Bitcoins?
Can cryptocurrencies be regulated?
What might the future hold?
Last Updated: