Szkolenia Cyber Security

Szkolenia Cyber Security

Praktyczne szkolenia na żywo z cyber security pozwoli uczestnikom na dokładne zrozumienie koncepcji bezpieczeństwa, koncepcji aplikacji internetowych i ram używanych przez programistów, aby móc wykorzystać i chronić docelową aplikację. W dzisiejszym świecie, który szybko się zmienia, a tym samym wszystkie stosowane technologie zmieniają się w szybkim tempie, aplikacje internetowe są narażone na ataki hakerów 24/7. Aby chronić aplikacje przed atakami z zewnątrz, trzeba znać wszystkie elementy, które sprawiają, że aplikacja internetowa, jak ramy, języki i technologie wykorzystywane w tworzeniu aplikacji internetowych, i wiele więcej. Problem polega na tym, że osoba atakująca musi znać tylko jeden sposób włamania do aplikacji, a programista (lub administrator systemu) musi znać wszystkie możliwe exploity, aby temu zapobiec. Z tego powodu naprawdę trudno jest mieć zabezpieczoną przed kulami aplikację internetową, aw większości przypadków aplikacja internetowa jest podatna na coś. Jest to regularnie wykorzystywane przez cyberprzestępców i przypadkowych hakerów, a można je zminimalizować poprzez prawidłowe planowanie, rozwój, testowanie aplikacji internetowych i konfigurację.
Szkolenie cyber security jest dostępne jako "szkolenie stacjonarne" lub "szkolenie online na żywo".
Szkolenie stacjonarne może odbywać się lokalnie w siedzibie klienta w Polsce lub w ośrodkach szkoleniowych NobleProg w Polsce. Zdalne szkolenie online odbywa się za pomocą interaktywnego, zdalnego pulpitu DaDesktop .

NobleProg -- Twój lokalny dostawca szkoleń.

Opinie uczestników

★★★★★
★★★★★

Plany szkoleń z technologii Cybersecurity

Nazwa kursu
Czas trwania
Opis
Nazwa kursu
Czas trwania
Opis
7 godzin
Opis
Celem szkolenia jest przybliżenie zagadnień związanych z bezpieczeństwem komputerowym w normalnym korzystaniu z komputera.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
35 godzin
Opis
Description:

This is a 'Practitioner' course and leans heavily on practical exercises designed to reinforce the concepts being taught and to build the delegates' confidence in implementing business continuity management. The course is also designed to encourage debate, and the sharing of knowledge and experience between students.
Delegates will benefit from the practical and extensive experiences of ours trainers who are practicing business continuity management and ISO 22301:2012 specialists.

Delegates will learn how to:

- Explain the need for business continuity management (BCM) in all organisations
- Define the business continuity lifecycle
- Conducting business continuity programme management
- Understand their organisation sufficiently to identify mission-critical impact areas
- Determine their organisation's business continuity strategy
- Establish a business continuity response
- Exercise, maintain and review plans
- Embed business continuity in an organisation
- Define terms and definitions appropriate to business continuity

By the end of the course, delegates will have a detailed understanding of all the key components of business continuity management and be able to return to their work, making a significant contribution to the business continuity management process.
28 godzin
Opis
This instructor-led, live training in w Polsce (online or onsite) is aimed at developers, engineers, and architects seeking to secure their web apps and services.

By the end of this training, participants will be able to integrate, test, protect, and analyze their web apps and services using the OWASP testing framework and tools.
35 godzin
Opis
Ta klasa zanurzy uczniów w interaktywnym środowisku, w którym zostaną pokazani, jak skanować, testować, hakować i zabezpieczać własne systemy. Laboratoryjne środowisko zapewnia każdemu uczniowi dogłębną wiedzę i praktyczne doświadczenie w zakresie obecnych podstawowych systemów bezpieczeństwa. Uczniowie zaczną od zrozumienia, w jaki sposób działa ochrona obwodowa, a następnie prowadzą do skanowania i atakowania własnych sieci, bez szkody dla prawdziwej sieci. Następnie uczniowie uczą się, jak intruzi eskalują przywileje i jakie kroki można podjąć, aby zabezpieczyć system. Uczniowie dowiedzą się również o wykrywaniu włamań, tworzeniu polityki, inżynierii społecznej, atakach DDoS, przepełnieniach buforów i tworzeniu wirusów. Kiedy uczeń opuści tę intensywną 5-dniową lekcję, będzie miał zrozumienie i doświadczenie w etycznym hakowaniu.

Celem szkolenia etycznego jest:

- Ustanowienie i zarządzanie minimalnymi standardami poświadczania profesjonalnych specjalistów ds. Bezpieczeństwa informacji w zakresie etycznych środków hakerskich.
- Poinformuj opinię publiczną, że uwierzytelnione osoby spełniają lub przekraczają minimalne standardy.
- Wzmocnij etyczne hakowanie jako unikalny i samoregulujący się zawód.

Publiczność:

Kurs jest idealny dla osób pracujących na stanowiskach takich jak, ale nie tylko:

- Inżynierowie bezpieczeństwa
- Konsultanci bezpieczeństwa
- Menedżerowie bezpieczeństwa
- Dyrektor IT / menedżerowie
- Audytorzy bezpieczeństwa
- Administratorzy systemów IT
- Administratorzy sieci IT
- Architekci sieci
- Deweloperzy
7 godzin
Opis
CAS, or Central Authentication Service, is an open-source, enterprise-level, single-sign-on protocol for the web. CAS gives users access to multiple applications using a single sign-on and allows web applications to authenticate users without giving them access to user passwords. CAS has a Java server component and various client libraries written in PHP, PL/SQL, Java, and more.

In this course, we discuss CAS's architecture and features and practice installing and configuring a CAS server. By the end of the course, participants will have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication) as well as the necessary practice to deploy and manage their own authentication server.

Audience

- System administrators

Format of the course

- Part lecture, part discussion, heavy hands-on practice
7 godzin
Opis
Shadowsocks is an open-source, secure socks5 proxy.

In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.

By the end of this training, participants will be able to:

- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server

Audience

- Network engineers
- System Administrators
- Computer technicians

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
35 godzin
Opis
Audience:

System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
7 godzin
Opis
NetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling.

In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods.

By the end of this training, participants will be able to:

- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system

Audience

- Network engineers
- Developers
- System engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
14 godzin
Opis
In this instructor-led, live training in w Polsce, participants will understand Internet of Things (IoT) architectures and learn the different IoT security solutions applicable to their organization.

By the end of this training, participants will be able to:

- Understand IoT architectures.
- Understand emerging IoT security threats and solutions.
- Implement technologies for IoT security in their organization.
7 godzin
Opis
This course covers the basic concepts of security and IT Security, with an emphasis on defending against network attacks. Participants will gain an understanding of essential security protocols and security concepts of web services. Recent attacks against cryptosystems and some recent related vulnerabilities will be referrenced
14 godzin
Opis
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.

In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.

By the end of this training, participants will be able to:

- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.

Audience

- Network engineers
- Cyber security professionals
- System architects
- IT managers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
14 godzin
Opis
This course is designed to help the attendee to build organizational resilience against a range of threats so that organizations can respond effectively to incidents, maintain the availability of business operations and safeguard its interests.
7 godzin
Opis
This course discusses how to manage an incident response team, how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge
21 godzin
Opis
This instructor-led, live training in w Polsce (online or onsite) is aimed at engineers who wish to safeguard connected vehicles from cyber attacks.

By the end of this training, participants will be able to:

- Implement cybersecurity in automotive systems.
- Choose the most suitable technologies, tools, and approaches.
35 godzin
Opis
Objectives:

To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification

Target Audience:

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
14 godzin
Opis
Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange
7 godzin
Opis
- After this one day seminar the attendee will be able to demonstrate knowledge and understanding of Cloud Computing.
14 godzin
Opis
The RESILIA course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.
14 godzin
Opis
This course explore the technical skills to implement, monitor and administer IT infrastructure using information security policies and procedures. And how to protecting the confidentiality, integrity and availability of data.
7 godzin
Opis
This course provides leaders and managers an overview of issues and activities associated with cybersecurity.

Leaders will receive information in various topics that will build their knowledge and hone executive decision-making in regard to the cybersecurity threat.
7 godzin
Opis
This course cover the basics of PKI, the basics of encryption, the Encrypting File System currently used by Windows 7 and Windows 8, the creation of a PKI using a variety of software and looking at tools which can exploit flaws in the implementation of a PKI.
7 godzin
Opis
This course cover the considertion of security and Privacy in the architecture, and how to design the security in the preperation of the design phase, the course also cover many technical controls to be designed in the architecture.
14 godzin
Opis
This two days course s designed for those with some data protection responsibilities in an
organization or who, for other reasons, wish to achieve and demonstrate a broad
understanding of the law, including the EU General Data Protection Regulation (GDPR) and
the UK Data Protection Bill and their practical application. It is recognized that those with
overall responsibility for data protection within an organization will need to develop a detailed
understanding of the law"
14 godzin
Opis
The Payment Card Industry Professional training course provides an individual qualification
for industry practitioners who wish to demonstrate their professional expertise and
understanding of the PCI Data Security Standard (PCI DSS).
7 godzin
Opis
This course discusses how to manage an incident response team. how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations.

Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge
7 godzin
Opis
The course is intended for those requiring intelligence or evidence from the Dark Web. This will usually be those working in government or law enforcement though may also be in the private sector.
7 godzin
Opis
This course help you to understand what is special about Bitcoin, we need to understand how it works at a technical level. We’ll address the important questions about Bitcoin, such as:
How does Bitcoin work?

What makes Bitcoin different?

How secure are your Bitcoins?

How anonymous are Bitcoin users?

What determines the price of Bitcoins?

Can cryptocurrencies be regulated?

What might the future hold?
14 godzin
Opis
This course is designed to show delegates how easy it can be for others to obtain data about ourselves through various means, but also how much of this can be stopped with a few tweaks to our machines and our online behavior.
7 godzin
Opis
This one day course show the cyber crime impact on the business and how the hackers can effect the business through the cyber crimes, the course discuss the history of cyber crime and security terminologies of the hacking and cyber security, finally it will discuss how to stop this risk on the business

Nadchodzące szkolenia z technologii Cyber Security

Szkolenie Cyber Security, Cybersecurity boot camp, Szkolenia Zdalne Cyber Security, szkolenie wieczorowe Cyber Security, szkolenie weekendowe Cybersecurity, Kurs Cyber Security,Kursy Cybersecurity, Trener Cybersecurity, instruktor Cybersecurity, kurs zdalny Cybersecurity, edukacja zdalna Cybersecurity, nauczanie wirtualne Cybersecurity, lekcje UML, nauka przez internet Cyber Security, e-learning Cyber Security, kurs online Cybersecurity, wykładowca Cyber Security

Kursy w promocyjnej cenie

Newsletter z promocjami

Zapisz się na nasz newsletter i otrzymuj informacje o aktualnych zniżkach na kursy otwarte.
Szanujemy Twoją prywatność, dlatego Twój e-mail będzie wykorzystywany jedynie w celu wysyłki naszego newslettera, nie będzie udostępniony ani sprzedany osobom trzecim.
W dowolnej chwili możesz zmienić swoje preferencje co do otrzymywanego newslettera bądź całkowicie się z niego wypisać.

Zaufali nam

This site in other countries/regions