Local instructor-led live Hands on Security training courses in България.
Oтзиви от потребители
★★★★★
★★★★★
Стремежът на обучение за обучение.
Ian McInally - KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Упражненията и груповите дискусии.
KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Треньорът беше много запознат и е щастлив да отиде на темпото на присъстващите. Той беше учтив и уважаван към всички, които присъстват. Чувствах се, че научих много от курса, тъй като треньорът беше много скучен в доставката му, когато минава през първите плъзгачи. Наистина, заслужава, докато се разхождате от моята лична гледна точка.
Julie Price - KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Околната среда беше наистина спокойна и отворена, така че всеки може да зададе въпроси или да постави в точки от гледна точка или опит. Дейвид Треньорът беше МСП по този въпрос, а стилът му беше много добър.
KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Вторият ден, упражнения за сценарии.
Christina Hutchings - KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Хареса ми въведението на акценто и анекдото, за да направят обучението по-реално
KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Дейвид в дълбочината на знаците. Неговите отношения изграждат умения с публиката. Наистина ми харесах начина, по който той успя да ни направи като колективна аудитория се наслаждава на доста суха и неинтераторна предмет. Той имаше анекдоти и познаване на конкретни примери за недостатъци на сигурността - хакерски атаки - BRAP "разбивки" и т.н., които поставят плът на костите на законодателството или "най-добрата практика" за БКП, която се опитва да ни научи. Наистина, ангажиране, на земята и човек, който е добър и ... един много добър слушател и страхотен, харизматичен треньор.
Cris Bollin - KnowledgePool
Course: Business Continuity Practitioner
Machine Translated
Всичко е отлично
Manar Abu Talib - Dubai Electronic Security Center
Course: MITRE ATT&CK
Machine Translated
\ - Разбирането, че ATT & CK създава карта, която улеснява виждането, където организацията е защитена и където са уязвимите области. След това да идентифицирате пропуските в сигурността, които са най-значими от гледна точка на риска. - Научете, че всяка техника идва със списък на смекчанията и откриването, които екипите за реагиране на инциденти могат да използват за откриване и защита на закона. - Научете за различните източници и общности за извличане на отбранителни препоръки.
CHU YAN LEE - PacificLight Power Pte Ltd
Course: MITRE ATT&CK
Machine Translated
Той си отне време да се увери, че всички са разбрали и са били на една и съща дължина на вълната
Tina Hopkins - Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Machine Translated
Намерих обучението и задълбочено за начинаещите. Имаше твърде много предмети, които почувствах, че са твърде напреднали за начинаещи ниво.
Capita Business Services Ltd
Course: Understanding Modern Information Communication Technology
Overview
This Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used.
Throughout the whole course, participants will gain in-depth knowledge on the following topics:
Legal aspects of a PKI
Elements of a PKI
PKI management
Trust in a digital world
Digital signature implementation
Trust models
After completing the PKI course, each individual will be able to successfully design, setup, deploy, and manage a public key infrastructure (PKI).
This is a 3-day course is considered essential for anyone who needs to understand Public Key Infrastructure (PKI) and the issues surrounding its implementation. It covers the issues and technologies involved in PKI in-depth and gives hands-on practical experience of setting up and maintaining a variety of PKI solutions. Detailed knowledge of issues surrounding PKI helps to put recent attacks which have appeared in the news headlines into context and enable valid decisions to be made about their relevance to your organisation.
Objectives
To introduce the student to the theoretical aspects of the foundations and benefits of Public Key Infrastructure (PKI), including different types of encryption, digital signatures, digital certificates and Certificate Authorities.
To give students hands on experience of implementing and using PKI solutions with a variety of applications.
To give students an understanding of the concepts of evaluating and selecting PKI technologies
Audience
Anyone involved in Public Key Infrastructure | PKI decision-making, implementing and securing e-commerce and other Internet applications, including CIOs, Chief Security Officers, MIS Directors, Security Managers and Internal Auditors.
The Certified Digital Forensics Examiner vendor neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation.
The Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.
The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence.
Description:
This course will give the participants thorough understanding about security concepts, web application concepts and frameworks used by developers in order to be able to exploit and protect targeted application. In today’s world, that is changing rapidly and thus all the technologies used are also changed at a fast pace, web applications are exposed to hackers attacks 24/7. In order to protect the applications from external attackers one has to know all the bits and pieces that makes the web application, like frameworks, languages and technologies used in web application development, and much more than that. The problem is that attacker has to know only one way to break into the application and developer (or systems administrator) has to know all the possible exploits in order to prevent this from happening. Because of that it is really difficult to have a bullet proof secured web application, and in most of the cases web application is vulnerable to something. This is regularly exploited by cyber criminals and casual hackers, and it can be minimized by correct planning, development, web application testing and configuration.
Objectives:
To give you the skill and knowledge needed to understand and identify possible exploits in live web applications, and to exploit identified vulnerabilities. Because of the knowledge gained through the identification and exploitation phase, you should be able to protect the web application against similar attacks. After this course the participant will be able to understand and identify OWASP top 10 vulnerabilities and to incorporate that knowledge in web application protection scheme.
Audience:
Developers, Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Banking, Insurance and other professionals, Government agencies, IT managers, CISO’s, CTO’s.
As a developer, your duty is to write bulletproof code.
What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?
This Web application security course will change the way you look at code. A hands-on training during which we will teach you all the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.
It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.
Delegates attending will:
Understand basic concepts of security, IT security and secure coding
Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
Learn client-side vulnerabilities and secure coding practices
Learn about Node.js security
Learn about MongoDB security
Have a practical understanding of cryptography
Understand essential security protocols
Understand security concepts of Web services
Learn about JSON security
Get practical knowledge in using security testing techniques and tools
Learn how to handle vulnerabilities in the used platforms, frameworks and libraries
Get sources and further readings on secure coding practices
This instructor-led, live training in България introduces the system architectures, operating systems, networking, storage, and cryptographic issues that should be considered when designing secure embedded systems.
By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software.
Interactive Application Security Testing (IAST) е форма на проверка на сигурността на приложенията, която съчетава статични тестове за сигурност на приложенията (SAST) и динамични тестове за сигурност на приложенията (DAST) или методи за самозащита на приложенията в работно време (RASP). IAST е в състояние да докладва конкретните линии на кода, отговорни за експлоатация на сигурността, и да възпроизвежда поведението, водещо до и следвайки такава експлоатация.
В този инструктор-управляван, на живо обучение, участниците ще научат как да се осигури приложение чрез инструментиране на агенти за работа и атакуващи индуктори, за да симулират поведението на приложение по време на атака. •
В края на обучението участниците ще могат да:
Симулиране на атаки срещу приложения и валидиране на техните възможности за откриване и защита
Използвайте RASP и DAST, за да получите видимост на нивото на кода в трасето на данните, взето от приложение в различни сценарии за работа.
Бързо и точно коригиране на кода за кандидатстване, отговорен за откритите уязвимости
Приоритет на откритията за уязвимост от динамични скани
Използвайте RASP сигнали в реално време, за да защитите приложенията в производството от атаки.
Намаляване на риска от уязвимост при прилагане, като същевременно се поддържат целите на графика на производството
Разработване на интегрирана стратегия за общото откриване и защита на уязвимостта
публиката
[ 0 ] Инженери
Инженери за сигурност
Разработчиците
Формат на курса
Частна лекция, частна дискусия, упражнения и тежка практика
Apache Shiro is a powerful Java security framework that performs authentication, authorization, cryptography, and session management.
In this instructor-led, live training, participants will learn how to secure a web application with Apache Shiro.
By the end of this training, participants will be able to:
Use Shiro's API to secure various types of applications, including mobile, web and enterprise
Enable logins from various data sources, including LDAP, JDBC, Active Directory, etc.
Audience
Developers
Security engineers
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
Target Audience would be - Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals
Description:
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how Intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Target Audience:
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
PowerShell е рамка за управление на задача, която позволява системите администраторите да конфигурират и автоматизират задачи, използващи скриптиране на език и командна линия. PowerShell’ възможностите за автоматизацията на задача позволяват потребителите да управляват и подобряват околната сигурност на Windows във цялата си организация.Този инструктор, живо обучение (одлинно или на местото) е намерен към SysAdmins, системните инженерни, безопасностни архитектори и аналитики, които искат да пишет, изпълни и да разработят Потенциални скрипти и команди за автоматизиране на управлението на безопасността на Windows в своята организация.До края на този обучение участниците ще могат да:
Напишайте и изпълните ПоwerShell команди за разработване на задачата за безопасността на Windows. Използвайте PowerShell за изпълнение на далечна команда за извършване на скрипти на хиляди системи през една организация. Конфигуриране и объркане Windows Server и Windows Firewall за защита на системите от маловъра и нападения. Управлява сертификат и автентификация за контрол на достъп и дейността на потребителите.
Формат на курса
Интерактивна лекция и дискуссия. Много упражнения и практика. Въвеждане на ръце в околната среда на живна търговия.
Опции за користиране на користиране
За да поискате приложително обучение за това курс, моля те, свържете се с нас за да се създадете.
Online Hands on Security courses, Weekend Hands on Security courses, Evening Hands on Security training, Hands on Security boot camp, Hands on Security instructor-led, Weekend Hands on Security training, Evening Hands on Security courses, Hands on Security coaching, Hands on Security instructor, Hands on Security trainer, Hands on Security training courses, Hands on Security classes, Hands on Security on-site, Hands on Security private courses, Hands on Security one on one training
Специални оферти
No course discounts for now.
Абонамент за специалните оферти
Ние се отнасяме с Вашите данни поверително и не ги предоставяме на трети страни. Можете да промените настройките си по всяко време или да се отпишете изцяло.
НЯКОИ ОТ НАШИТЕ КЛИЕНТИ
is growing fast!
We are looking for a good mixture of IT and soft skills in Bulgaria!
As a NobleProg Trainer you will be responsible for:
delivering training and consultancy Worldwide
preparing training materials
creating new courses outlines
delivering consultancy
quality management
At the moment we are focusing on the following areas:
Statistic, Forecasting, Big Data Analysis, Data Mining, Evolution Alogrithm, Natural Language Processing, Machine Learning (recommender system, neural networks .etc...)
SOA, BPM, BPMN
Hibernate/Spring, Scala, Spark, jBPM, Drools
R, Python
Mobile Development (iOS, Android)
LAMP, Drupal, Mediawiki, Symfony, MEAN, jQuery
You need to have patience and ability to explain to non-technical people
To apply, please create your trainer-profile by going to the link below: