• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

796 Cyber Security courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

CertNexus Certified Ethical Emerging Technologist (CEET) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technology leaders, solution developers, project managers, organizational decision makers, and other individuals seeking to demonstrate a vendor-neutral, cross-industry understanding of ethics in emerging data-driven technologies, such as AI, robotics, IoT, and data science. This course is also designed for professionals who want to pursue the CertNexus Certification Exam CET-110: Certified Ethical Emerging Technologies. Overview In this course, you will incorporate ethics into data-driven technologies such as AI, IoT, and data science. You will: Describe general concepts, theories, and challenges related to ethics and emerging technologies. Identify ethical risks. Practice ethical reasoning. Identify and mitigate safety and security risks. Identify and mitigate privacy risks. Identify and mitigate fairness and bias risks. Identify and mitigate transparency and explainability risks. Identify and mitigate accountability risks. Build an ethical organization. Develop ethical systems in technology-focused organizations. Mutually reinforcing innovations in computing and engineering are catapulting advances in technological production. From blockchain and artificial intelligence (AI) to gene editing and the Internet of Things (IoT), these advances come with tremendous opportunities for improvement in productivity, efficiency, and human well-being. But as scandals increasingly demonstrate, these advances also introduce new and serious risks of conflict and harm.Technology professionals now face growing demands to identify and mitigate ethical risks to human rights and the environment, as well as to navigate ethical tradeoffs between qualities such as privacy and accuracy, fairness and utility, and safety and accountability. This course provides the tools to identify and manage common ethical risks in the development of emerging data-driven technologies. It distills ethical theory, public regulations, and industry best practices into concrete skills and guidelines needed for the responsible development of digital products and services. By following the course's practical, problems-based approach, learners will become adept at applying theories, principles, frameworks, and techniques in their own roles and organizations. INTRODUCTION TO ETHICS OF EMERGING TECHNOLOGIES * Topic A: What?s at Stake * Topic B: Ethics and Why It Matters * Topic C: Ethical Decision-Making in Practice * Topic D: Causes of Ethical Failures * IDENTIFYING ETHICAL RISKS * Topic A: Ethical Reasons * Topic B: Stumbling Blocks for Ethical Reasoning * Topic C: Identify Ethical Risks in Product Development * Topic D: Tools for Identifying Ethical Risks * Topic E: Use Regulations, Standards, and Human Rights to Identify Ethical Risks * ETHICAL REASONING IN PRACTICE * Topic A: Ethical Theories * Topic B: Use Ethical Decision-Making Frameworks * Topic C: Select Options for Action * Topic D: Avoid Problems in Ethical Decision-Making * IDENTIFYING AND MITIGATING SECURITY RISKS * Topic A: What Is Security? * Topic B: Identify Security Risks * Topic C: Security Tradeoffs * Topic D: Mitigate Security Risks * IDENTIFYING AND MITIGATING PRIVACY RISKS * Topic A: What Is Privacy? * Topic B: Identify Privacy Risks * Topic C: Privacy Tradeoffs * Topic D: Mitigate Privacy Risks * IDENTIFYING AND MITIGATING FAIRNESS AND BIAS RISKS * Topic A: What Are Fairness and Bias? * Topic B: Identify Bias Risks * Topic C: Fairness Tradeoffs * Topic D: Mitigate Bias Risks * IDENTIFYING AND MITIGATING TRANSPARENCY AND EXPLAINABILITY RISKS * Topic A: What Are Transparency and Explainability? * Topic B: Identify Transparency and Explainability Risks * Topic C: Transparency and Explainability Tradeoffs * Topic D: Mitigate Transparency and Explainability Risks * IDENTIFYING AND MITIGATING ACCOUNTABILITY RISKS * Topic A: What Is Accountability? * Topic B: Identify Accountability Risks * Topic C: Accountability Tradeoffs * Topic D: Mitigate Accountability Risks * BUILDING AN ETHICAL ORGANIZATION * Topic A: What Are Ethical Organizations? * Topic B: Organizational Purpose * Topic C: Ethics Awareness * Topic D: Develop Professional Ethics within Organizations * DEVELOPING ETHICAL SYSTEMS IN TECHNOLOGY-FOCUSED ORGANIZATIONS * Topic A: Policy and Compliance * Topic B: Metrics and Monitoring * Topic C: Communication and Stakeholder Engagement * Topic D: Ethical Leadership *

CertNexus Certified Ethical Emerging Technologist (CEET) v1.0
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints v6.0 (SSFAMP)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security administrators Security consultants Network administrators Systems engineers Technical support personnel Cisco integrators, resellers, and partners Overview Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection· Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations This course shows you how to deploy and use Cisco AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. COURSE OUTLINE * Introducing Cisco AMP Technologies * Introducing AMP for Endpoints Overview and Architecture * Navigating the Console Interface * Using Cisco AMP for Endpoints * Identifying Attacks * Analyzing Malware * Managing Outbreak Control * Creating Endpoint Policies * Working with AMP for Endpoint Groups * Using Orbital for Endpoint Visibility * Introducing AMP REST API * Navigating Accounts

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints v6.0 (SSFAMP)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is as follows: Cisco integrators, resellers, and partners Network administrators Security administrators Security consultants Systems engineers Technical support personnel Overview After taking this course, you should be able to: Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors. Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0 is a 3-day course that shows you how to deploy and use Cisco© AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification.This class will help you:Learn how to deploy and manage Cisco AMP for EndpointsSucceed in today?s high-demand security operations roles COURSE OUTLINE * This course will cover the following topics: * Introducing to Cisco AMP Technologies * Introducing AMP for Endpoints Overview and Architecture * Navigating the Console Interface * Using Cisco AMP for Endpoints * Identifying Attacks * Analyzing Malware * Managing Outbreak Control * Creating Endpoint Policies * Working with AMP for Endpoint Groups * Using Orbital for Endpoint Visibility * Introducing AMP REST API * Navigating Accounts

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v6.0
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco Securing Networks with Cisco Firepower Next-Generation IPS v4.0 (SSFIPS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy and manage a Cisco Firepower NGIPS in their network environment. Security administrators Security consultants Network administrators System engineers Technical support personnel Channel partners and resellers Overview After taking this course, you should be able to: Describe the components of Cisco Firepower Threat Defense and the managed device registration process Detail Next-Generation Firewalls (NGFW) traffic control and configure the Cisco Firepower system for network discovery Implement access control policies and describe access control policy advanced features Configure security intelligences features and the Advanced Malware Protection (AMP) for Networks implementation procedure for file control and advanced malware protection Implement and manage intrusion and network analysis policies for NGIPS inspection Describe and demonstrate the detailed analysis techniques and reporting features provided by the Cisco Firepower Management Center Integrate the Cisco Firepower Management Center with an external logging destination Describe and demonstrate the external alerting options available to Cisco Firepower Management Center and configure a correlation policy Describe key Cisco Firepower Management Center software update and user account management features Identify commonly misconfigured settings within the Cisco Firepower Management Center and use basic commands to troubleshoot a Cisco Firepower Threat Defense device This course shows you how to deploy and use Cisco Firepower© Next-Generation Intrusion Prevention System (NGIPS). This hands-on course gives you the knowledge and skills to use the platform features and includes firewall security concepts, platform architecture and key features; in-depth event analysis including detection of network-based malware and file type, NGIPS tuning and configuration including application control, security intelligence, firewall, and network-based malware and file controls; Snort© rules language; file and malware inspection, security intelligence, and network analysis policy configuration designed to detect traffic patterns; configuration and deployment of correlation policies to take action based on events detected; troubleshooting; system and user administration tasks, and more. This course helps you prepare to take the exam, Securing Networks with Cisco Firepower (300-710 SNCF), which leads to CCNP Security and Cisco Certified Specialist ? Network Security Firepower certifications. The 300-710 SNCF exam has a second preparation course as well, Cisco© Securing Networks with Cisco© Firepower Next Generation Firewall (SSNGFW). You can take these courses in any order. COURSE OUTLINE * Cisco Firepower Threat Defense Overview * Cisco Firepower NGFW Device Configuration * Cisco Firepower NGFW Traffic Control * Cisco Firepower Discovery * Implementing Access Control Policies * Security Intelligence * File Control and Advanced Malware Protection * Next-Generation Intrusion Prevention Systems * Network Analysis Policies * Detailed Analysis Techniques * Cisco Firepower Platform Integration * Alerting and Correlation Policies * Performing System Administration * Troubleshooting Cisco Firepower

Cisco Securing Networks with Cisco Firepower Next-Generation IPS v4.0 (SSFIPS)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Cisco SD-WAN Security and Cloud Onboarding v1.1 (SDWSCS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for the following roles: Network engineers Network security engineers Network architects Sales/presales engineers Overview After completing the course, you should be able to: Describe Cisco SD-WAN security functions and deployment options Understand how to deploy on-premises threat prevention Describe content filtering options Implement secure Direct Internet Access (DIA) Explain and implement service chaining Explore Secure Access Service Edge (SASE) and identify use cases Describe Umbrella Secure Internet Gateway (SIG) and deployment options Implement Cisco Umbrella SIG and DNS policies Explore and implement Cloud Access Security Broker (CASB) and identify use cases (including Microsoft 365) Discover how to use Cisco ThousandEyes to monitor cloud services Configure Cisco ThousandEyes to monitor Microsoft 365 applications Examine how to protect and optimize access to the software as a service (SaaS) application with Cisco SD-WAN Cloud OnRamp Discover and deploy Cloud OnRamp for multi-cloud, including interconnect and collocation use cases Examine Cisco SD-WAN monitoring capabilities and features with vManage and vAnalytics. The Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS) v1.1 course is an advanced training course focused on Cisco SD-WAN security and cloud services. Through a series of labs and lectures you will learn about on-box security services, including application aware enterprise firewall, intrusion prevention, URL filtering, malware protection, and TLS or SSL decryption. You will also learn about cloud integration with multiple cloud services providers and multiple use-cases. Additionally, the lab will allow you to configure and deploy local security services and cloud security services with the Cisco Umbrella Secure Internet Gateway (SIG), as well as integrate the Cisco SD-WAN fabric with a cloud service provider using the Cisco vManage automated workflows. COURSE OUTLINE * Introducing Cisco SD-WAN Security * Deploying On-Premises Threat Prevention * Examining Content Filtering * Exploring Cisco SD-WAN Dedicated Security Options * Examining Cisco SASE * Exploring Cisco Umbrella SIG * Securing Cloud Applications with Cisco Umbrella SIG * Exploring Cisco SD-Wan ThousandEyes * Optimizing SaaS Applications * Connecting Cisco SD-WAN to Public Cloud * Examining Cloud Interconnect Solutions * Exploring Cisco Cloud OnRamp for Colocation * Monitoring Cisco SD-WAN Cloud and Security Solutions

Cisco SD-WAN Security and Cloud Onboarding v1.1 (SDWSCS)
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)DFE - Certified Digital Forensics Examiner Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Virtualization Engineers and Managers Cloud Security Managers Overview Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam. The Certified Digital Forensics Examiner, C)DFE certification is designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques.ÿ This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2?s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-ðcustody, and write a findings report. Through the use of a risk-based approach, the C)DFE is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. COURSE OUTLINE * Computer Forensic Incidents * Investigative Theory * Investigative Process * Digital Acquisition and Analysis * Disks and Storages * Live Acquisitions * Windows Forensics * Linux Forensics * Mac Forensics * Examination Protocols * Digital Evidence Protocols * Digital Evidence Presentation * Laboratory Protocols * Specialized Artifact Recovery * eDiscovery and ESI * Mobile Forensics * Incident Handling * Reporting ADDITIONAL COURSE DETAILS: Nexus Humans C)DFE - Certified Digital Forensics Examiner Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)DFE - Certified Digital Forensics Examiner Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)DFE - Certified Digital Forensics Examiner Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "Cyber Security"

Show all 472
Cyber Security Training Courses

cyber security training courses

Kent

The Cyber Security training market is saturated with different providers all offering similar training courses. With so many to choose from navigating the different providers is a long process. Cyber Security Training Courses simplifies this by pulling in the training courses from all the providers to one site and one easy search The site was launched to enhance the service that we provide via CyberSecurityJobsite.com, the specialist site for the cyber security market. We offer an information portal that can assist candidates to find the best courses to progress their career within the IT security industry. We host 100s of training courses, undergraduate and post graduate university courses and apprenticeships from training providers, leading universities and colleges and industry leading employers. Whether you are looking for a course to progress your own career or looking for a training provider to enhance your employee’s skills, the site can assist you. Register with us to apply for courses, receive industry news or receive email alerts if a course is added to the site that matches your criteria. CyberSecurityJobsite now also runs the Cyber Security EXPO which is the only dedicated recruitment event designed for Clients and Candidates within the Cyber Security / InfoSec marketplace. The EXPO's are Free to attend for all registered candidates and provides an opportunity to meet with direct employers and recruitment agencies that are recruiting in this space. If you have any question on how we operate, please contact one of the team.