Сhat now
Training Center MUKКурсыCybersecurity Courses

Cybersecurity Courses

Filters
Vendor
Delivery format
Apply
Filters
Sort by
Sort by:
Popular
View:
CI-SCOR
Cisco
Implementing and Operating Cisco Security Core Technologies
Курс Внедрение ключевых технологий безопасности Cisco (SCOR) v1.0 поможет Вам подготовиться не только к получению сертификаций Cisco® CCNP® Security и CCIE® Security, но и к работе в области безопасности на должностях самого высокого уровня.
Classroom Live, virtual classroom live
5 Days, 40 Acad. Hours
WE761GUA
IBM
Administration of IBM DataPower Gateway V7.6
Rare
IBM DataPower Gateway Appliances are network devices that help secure, integrate, and optimize access to web, web services, mobile, and API workloads. Through instructor-led lectures and hands-on lab exercises, you learn how to run various administrative procedures, from initial installation and setup through ongoing maintenance of the appliances in production.
Classroom Live, virtual classroom live
3 Days, 20 Acad. Hours
CEH11
Security
Certified Ethical Hacking (CEH) v11
The course provides detailed knowledge on ensuring computer security of modern systems and will be important for security administrators in a reference book on various methods and means of hacking computer networks and systems. The course is also useful for security personnel to improve their work efficiency, taking into account the new tricks of the attackers. In addition, the course is useful for security professionals as a preparation for obtaining international certification.
Classroom Live, virtual classroom live
5 Days, 40 Acad. Hours
CCES
Check Point
Check Point Certified Endpoint Specialist
A 2-day Specialist course which provides a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.A 2-day Specialist course which provides a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment.
Classroom Live, virtual classroom live
2 Days, 16 Acad. Hours
FG-M
Fortinet
FortiManager Administrator
In this two-day class, you will learn the fundamentals of using FortiManager for centralized network administration of many FortiGate devices. In interactive labs, you will explore deployment strategies, which include single or multiple ADOMs, device registration, policy packages, shared objects, installing configuration changes, provisioning FortiManager as a local FortiGuard distribution server, and troubleshooting the features that are critical to day-to-day use after you deploy FortiManager.
Classroom Live, virtual classroom live
2 Days, 16 Acad. Hours
9I040UA
IBM
IBM i2 Analyst's Notebook Customizing and Semantics
Classroom Live, virtual classroom live
2 Days, 16 Acad. Hours
CI-SISE
Cisco
Implementing and Configuring Cisco Identity Services Engine
Тренинг «Внедрение и настройка решения Cisco Identity Services Engine» обеспечивает системных инженеров, инженеров по безопасности и сетевых администраторов практическими навыками по установке, развертыванию и управлению решением Cisco Identity Services Engine (ISE), с целью поддержки аутентификации, авторизации, работы с аккаунтами и политиками сети для пользователей и устройств. Студенты пройдут через весь процесс установки и настройки сетевых устройств, используя ISE в качестве платформы контроля доступа в сети.
Classroom Live, virtual classroom live
5 Days, 40 Acad. Hours
MUK-S0101
Security
SecurityPlus
Для всех IT-специалистов, заинтересованных в получении минимального набора знаний и навыков по основам информационной безопасности
Classroom Live, virtual classroom live
5 Days, 40 Acad. Hours
CCMS
Check Point
Check Point Certified Multi-Domain Security Management Specialist
A 2-day Specialist course which provides a comprehensive understanding of the Check Point Multi-Domain Security Management solution and how to deploy it within the corporate network environment.
Classroom Live, virtual classroom live
2 Days, 16 Acad. Hours
FA-An
Fortinet
FortiAnalyzer Analyst
In this course, you will learn the fundamentals of using FortiAnalyzer for centralized logging. You will also learn how to identify current and potential threats through log analysis. Finally, you will examine the management of events, incidents, reports, and task automation with playbooks. These skills will provide you with a solid foundation for becoming a SOC analyst in an environment using Fortinet products.
Classroom Live, virtual classroom live
1 Days, 8 Acad. Hours
Сhat now
Свяжитесь со мной
Сhat now
Отправить заявку
Registration for the webinar
Отправить заявку
Your application has been received! We will contact you soon.