Получить консультацию
Training Center MUKКурсыКурсы Информационная безопасность

Курсы Информационная безопасность

Фильтры
Вендор
Формат
Применить
Фильтры
Сортировка
Вид:
 PRO MUK01
Security
Основы безопасного программирования с использованием инструментальных средств анализа программного кода
Качественный, настроенный и ориентированный на безопасность жизненный цикл разработки программного обеспечения (ЦРПО) - это ключ к успеху приложений. Наши эксперты по безопасности помогут Вашей команде разработчиков создавать безопасные приложения, встраивая требования безопасности в процесс разработки, начиная с самой первой фазы.
Аудиторно, дистанционно
4 Дней, 32 Ак. Часов
SE-AWS
Amazon Web Services (AWS)
Security Engineering on AWS
Learn how to use AWS security services to stay secure in the AWS Cloud. Enhance the security of your data and systems in the cloud with AWS-recommended security practices. In this course, you’ll explore the security features of AWS key services, including compute, storage, networking, and database services. You’ll also learn how to use AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents.
Аудиторно, дистанционно
3 Дней, 24 Ак. Часов
AWS-SE
Amazon Web Services (AWS)
AWS Security Essentials
AWS Security Essentials covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization.
This course enables you to dive deep, ask questions, work through solutions, and get feedback from AWS-accredited instructors with deep technical knowledge. This is a fundamental level course and is a part of the AWS Security learning path.
Аудиторно, дистанционно
1 Дней, 8 Ак. Часов
CI-SAUI
Cisco
Автоматизация работы решений Cisco по обеспечению безопасности
Аудиторно, дистанционно
5 Дней, 40 Ак. Часов
EX415
Red Hat
Red Hat Certified Specialist in Security: Linux exam
The Red Hat Certified Specialist in Security: Linux exam validates your knowledge and abilities in securing Red Hat® Enterprise Linux®.
Аудиторно, дистанционно
1 Дней, 4 Ак. Часов
AZ-500T00-A
Microsoft
Microsoft Azure Security Technologies
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.
Аудиторно, дистанционно
4 Дней, 32 Ак. Часов
MS-101T00-A
Microsoft
Microsoft 365 Mobility and Security
This course covers three central elements of Microsoft 365 enterprise administration – Microsoft 365 security management, Microsoft 365 compliance management, and Microsoft 365 device management. In Microsoft 365 security management, you will examine all the common types of threat vectors and data breaches facing organizations today, and you will learn how Microsoft 365’s security solutions address these security threats. You will be introduced to the Microsoft Secure Score, as well as to Azure Active Directory Identity Protection. You will then learn how to manage the Microsoft 365 security services, including Exchange Online Protection, Advanced Threat Protection, Safe Attachments, and Safe Links. Finally, you will be introduced to the various reports that monitor your security health. You will then transition from security services to threat intelligence; specifically, using the Security Dashboard and Advanced Threat Analytics to stay ahead of potential security breaches.
Аудиторно, дистанционно
5 Дней, 40 Ак. Часов
MS-500T00-A
Microsoft
Microsoft 365 Security Administration
In this course you will learn how to secure user access to your organization’s resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365. You will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions to mitigate threats. You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management. In the course you will learn about information protection technologies that help secure your Microsoft 365 environment. The course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. This course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations.
Аудиторно, дистанционно
4 Дней, 32 Ак. Часов
Получить консультацию
Свяжитесь со мной
Получить консультацию
Отправить заявку
Регистрация на вебинар
Отправить заявку
Ваша заявка получена!
Мы свяжемся с вами в ближайшее время.