Courses

We found 30 courses available for you
See
-19%

Forensic Toolkit FTK Training Certification

40 hours
Intermediate

Forensic Toolkit Our Course Advisor Computer Forensics: FTK Forensic Toolkit …

What you'll learn
Defining digital evidence and their types
Different processes for different devices
How to set up Computer forensics laboratory

Red Hat Open Stack Certified Architect in Delhi

40 hours
Intermediate

Red Hat Certified Architect | Red Hat Open Stack Bestseller …

What you'll learn
Red Hat OpenStack (EX210 and EX310)
Red Hat Certified Specialist in Virtualization (RHCVA, EX318)
Red Hat Certified Specialist in High Availability Clustering (RH436)
Red Hat Certified Specialist in OpenShift Administration (EX280)
Red Hat Certified Specialist in Containers and Kubernetes (EX180)
-24%

EC-Council Certified Incident Handler (ECIH) V2 Course

40 hours
Intermediate

EC-Council Certified Incident Handler Course (ECIH v2) Bestseller 4.6  …

What you'll learn
To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.
To ensure that organization can identify, contain, and recover from an attack.
To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.
To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.
To minimize the loss and after-effects breach of the incident.
For individuals: To enhance skills on incident handling and boost their employability.
-17%

HP ArcSight ESM Training Certification

60 hours
Intermediate

HP ArcSight ESM Our Course Advisor Requirements Basic IT Skills …

What you'll learn
Common security devices, such as IDS & firewalls
Common network device functions, such as routers, switches, hubs, etc.
TCP/IP functions, such as CIDR blocks, subnets, addressing, communications, etc.
Basic Windows operating system tasks & functions
Possible attack activities, such as scans, a man in the middle, sniffing, DoS, etc., and possible abnormal activities, such as worms, Trojans, viruses, etc.
SIEM terminology, such as threat, vulnerability, risk, asset, exposure, safeguards, etc.
6 months experience administering HP ArcSight ESM
Completed HP ArcSight ESM Administrator
-29%

Red Hat One Time Offer Red Hat Enterprise Linux-8 Training Online RHCSA RHCSA Complete Red Hat Training Course

40 hours
Intermediate

Add to cart +91 951 380 5401 | 011-4039 4315 …

What you'll learn
Red Hat OpenStack
Analyzing Servers and Getting Support
Tuning System Performance
Managing SELinux Security
Managing Files from the command Line
Accessing the Command Line
-80%

Online Web Application Security Course In Delhi

131 Lessons
60 hours
Intermediate

Web Application Security Course In Delhi? (Top 20 Critical Web …

-80%

Learn Online CompTIA CYSA+ Training Course in Delhi

40 hours
Expert

Latest Student Reviews Google reviews(1129)  5/5 Name Testimonial Review …

What you'll learn
Threat and vulnerability management
Risk mitigation, policies, procedures, and controls
Implementing security solution in the management of infrastructure
Analyzing data for continuous security monitoring
Implementing configuration changes to improve security
Policies, procedures, and controls
-80%

Online CISCO CCNA Course in Delhi (200-301)

32 Lessons
40 hours
Beginner

Cisco CCNA Our Course Advisor Best CCNA Online Training in …

What you'll learn
Security Fundamentals.
Automation and Programmability.
IP Services.