网络空间安全(Cyber Security)培训课程 | Cyber Security培训课程

网络空间安全(Cyber Security)培训课程

本地,有教师指导的现场网络安全(也称为网络安全,互联网安全或信息技术安全)培训课程通过互动式讨论和实践练习,展示如何在其组织内理解,规划和实施网络安全策略。特别着重于建立检测和减轻威胁所需的适当系统和程序。 Internet Security课程可作为交互式培训提供,其中一些课程包括测试和认证组件。网络安全培训可作为“现场实况培训”或“远程实时培训”。现场实地培训可在当地客户现场进行中国或者在NobleProg公司的培训中心中国 。远程实时培训通过交互式远程桌面进行。 NobleProg您当地的培训提供商。

Machine Translated

客户评论

★★★★★
★★★★★

网络空间安全(Cyber Security)课程大纲

课程名称
课程时长
课程概览
课程名称
课程时长
课程概览
14小时
This instructor-led, live training in 中国 (online or onsite) is aimed at security managers who wish to learn basic to intermediate-level CCTV security surveillance and management skills. By the end of this training, participants will be able to:
  • Familiarize the types of CCTV systems and know their benefits and features.
  • Understand cabling and CCTV systems setup requirements.
  • Install, configure, and manage CCTV systems.
14小时
This instructor-led, live training in 中国 (online or onsite) is aimed at security professionals who wish to learn and improve how to handle security threats and perform security risk assessments. By the end of this training, participants will be able to:
  • Manage security systems and handle any hostile environment.
  • Manage any security risks or threats.
  • Learn how to conduct security risk assessments.
14小时
This instructor-led, live training in 中国 (online or onsite) is aimed at service technicians, system admins, or anyone who wishes to learn proper installation, usage, and management of the Honeywell security system. By the end of this training, participants will be able to:
  • Learn the concepts of the Honeywell security systems and components.
  • Properly install and maintain a Honeywell security system.
  • Utilize the Honeywell maintenance tools and management suite to control a security system.
7小时
Cyber Security is the practice of applying technologies, controls, and processes to protect computer systems, servers, networks, devices, programs, and data from malicious cyber attacks. This instructor-led, live training (online or onsite) is aimed at anyone who wish to learn how to protect internet-connected systems from different kinds of cyber threats. By the end of this training, participants will be able to:
  • Understand the concept of Cyber Security.
  • Learn and understand the different Cyber Security threats.
  • Learn processes and best practices to protect internet-connected systems from cyber attacks.
Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange.
7小时
This instructor-led, live training in 中国 (online or onsite) is aimed at developers and anyone who wishes to learn and use OAuth to provide applications with secure delegated access. By the end of this training, participants will be able to:
  • Learn the fundamentals of OAuth.
  • Understand the native applications and their unique security issues when using OAuth.
  • Learn and understand the common extensions to the OAuth protocols.
  • Integrate with any OAuth authorization server.
14小时
This instructor-led, live training in 中国 (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code. By the end of this training, participants will be able to:
  • Understand the features and structure of Snyk.
  • Use Snyk to find and fix code security issues.
  • Integrate Snyk in a software development lifecycle.
14小时
该课程提供了关于 OpenStack 和私人云安全的实用知识。 它从引入到系统开始,然后参与者将获得在私人云中的安全和安全 OpenStack 安装的实用知识。
28小时
This instructor-led, live training in 中国 (online or onsite) is aimed at developers, engineers, and architects seeking to secure their web apps and services. By the end of this training, participants will be able to integrate, test, protect, and analyze their web apps and services using the OWASP testing framework and tools.
35小时
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. The purpose of the Ethical Hacking Training is to:
  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.
Audience: The Course is ideal for those working in positions such as, but not limited to:
  • Security Engineers
  • Security Consultants
  • Security Managers
  • IT Director/Managers
  • Security Auditors
  • IT Systems Administrators
  • IT Network Administrators
  • Network Architects
  • Developers
7小时
In this instructor-led, live training 中国 (online or onsite), we discuss CAS's architecture and features and practice installing and configuring a CAS server. By the end of this training, participants will be able to:
  • Have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication).
  • Have the necessary practice to deploy and manage their own authentication server.
7小时
Shadowsocks是一个开源的,安全的socks5代理。 在这个有指导的现场培训中,参与者将学习如何通过Shadowsocks代理获得互联网连接。 在培训结束后,参与者将能够: 在任何支持的平台上安装和配置Shadowsocks,包括Windows,Linux,Mac,Android,iOS和OpenWRT。 使用包管理器系统(例如pip,aur,freshports等)部署Shadosocks。 在移动设备和无线网络上运行Shadowsocks。 了解Shadowsocks如何加密消息并确保完整性和真实性。 优化Shadowsocks服务器 听众 网络工程师系统管理员计算机技术人员 课程的格式 部分讲座,部分讨论,练习和沉重的练习
7小时
NetNORAD是一个由Facebook构建的系统,用于通过端到端探测解决网络问题,与设备轮询无关。 在这个由讲师指导的实时培训中,参与者将了解NetNORAD和主动路径测试如何帮助他们改进网络故障排除方法。 在培训结束时,参与者将能够:
  • 了解NetNORAD的工作原理
  • 了解NetNORAD背后的设计原则
  • 使用开源NetNORAD工具和自己的代码来实现故障检测系统
听众
  • 网络工程师
  • 开发商
  • 系统工程师
课程形式
  • 部分讲座,部分讨论,练习和繁重的实践练习
14小时
Internet of Things (IoT)是一种网络基础设施,可以无线连接物理对象和软件应用程序,允许它们相互通信并通过网络通信,云计算和数据捕获交换数据。部署物联网解决方案的主要障碍之一是安全性。由于物联网技术涉及广泛的设备,因此设计物联网安全对于成功部署物联网至关重要。 在以讲师为主导的现场培训中,参与者将了解Internet of Things (IoT)架构,并了解适用于其组织的不同物联网安全解决方案。 在培训结束时,参与者将能够:
  • 了解物联网架构。
  • 了解新出现的物联网安全威胁和解决方案。
  • 在其组织中实施物联网安全技术。
课程形式
  • 部分讲座,部分讨论,练习和繁重的实践练习
注意
  • 要申请本课程的定制培训,请联系我们安排
7小时
本课程介绍了安全性和IT安全性的基本概念,重点是防范网络攻击。参与者将了解Web服务的基本安全协议和安全概念。最近针对密码系统的攻击和一些最近的相关漏洞将被引用
14小时
BeyondCorp是一个开源零信任安全框架,允许员工从任何位置安全地工作,而无需传统的VPN。 在这个以讲师为主导的现场培训中,参与者将学习如何在实时实验室环境中设置和部署BeyondCorop时设置零安全系统。 在培训结束时,参与者将能够:
  • 评估其组织的现有安全模型。
  • 将访问控制从周边转移到单个设备和用户。
  • 使用用户和以设备为中心的身份验证和授权工作流来部署应用程序。
  • 在其组织内了解,规划和实施零信任网络。
听众
  • 网络工程师
  • 网络安全专业人士
  • 系统架构师
  • IT经理
课程格式
  • 部分讲座,部分讨论,练习和繁重的实践练习
注意
  • 要申请本课程的定制培训,请联系我们安排。
14小时
This course is designed to help the attendee to build organizational resilience against a range of threats so that organizations can respond effectively to incidents, maintain the availability of business operations and safeguard its interests. 
7小时
本课程讨论如何管理事件响应团队,第一响应者如何行动,考虑到当今网络攻击的频率和复杂性,事件响应是组织的关键功能。事件响应是最后一道防线,检测并有效响应事件需要强大的管理流程,管理事件响应团队需要特殊的技能和知识
21小时
Automotive 指保护汽车电子系统、通信网络、控制算法、软件、用户和基础数据免受恶意攻击、损害、未经授权访问或操纵。 由教练领导的现场培训(在线或现场)针对那些希望保护连接的车辆免受网络攻击的工程师。 在本研讨会结束后,参与者将能够:
    在汽车系统中实施网络安全。 选择最合适的技术、工具和方法。
课程格式
    互动讲座和讨论。 很多练习和练习。 在现场实验室环境中进行手动实施。
课程定制选项
    要申请此课程的定制培训,请联系我们安排。
14小时
课程格式
  • 互动讲座和讨论。
  • 大量的练习和练习。
  • 在实时实验室环境中亲自实施。
课程自定义选项
  • 要申请本课程的定制培训,请联系我们安排
7小时
  • 在为期一天的研讨会之后,与会者将能够展示对Cloud Computing知识和理解。
14小时
RESILIA课程从目的,关键术语,弹性和安全性之间的区别以及实施网络弹性的好处开始。它介绍了风险管理以及解决风险和机遇所需的关键活动。此外,它解释了共同管理标准和最佳实践框架与实现网络弹性的相关性。随后,它确定了应与相应的ITSM活动保持一致的网络弹性过程,相关的控制目标,交互和活动。在课程的最后部分,它描述了与网络弹性角色和职责相关的职责分离和双重控制。
35小时
This course explore the technical skills to implement, monitor and administer IT infrastructure using information security policies and procedures. And how to protecting the confidentiality, integrity and availability of data.    
 
7小时
本课程为领导者和管理者提供与网络安全相关的问题和活动的概述。 领导者将获得各种主题的信息,这些信息将构建他们的知识并磨练有关网络安全威胁的执行决策。
7小时
本课程涵盖了PKI的基础知识,加密的基础知识,Windows 7和Windows 8当前使用的加密文件系统,使用各种软件创建PKI以及查看可以利用PKI实现中的漏洞的工具。
7小时
本课程涵盖了体系结构中安全性和隐私性的考虑,以及如何在设计阶段的设计阶段设计安全性,该课程还涵盖了在体系结构中设计的许多技术控制。
14小时
这两天课程专为那些负有一些数据保护责任的人而设计
组织或由于其他原因希望实现和展示广泛的组织
了解法律,包括欧盟通用Data Protection条例( GDPR )和
英国Data Protection法案及其实际应用。人们认识到那些
组织内部数据保护的总体责任需要详细制定
对法律的理解“
14小时
支付卡行业专业培训课程提供个人资格
对于希望展示其专业知识和技能的行业从业者而言
了解PCI数据安全标准(PCI DSS)。
7小时
This course discusses how to manage an incident response team. how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge
7小时
该课程适用于那些需要来自Dark Web的情报或证据的人。这通常是那些在政府或执法部门工作的人,但也可能在私营部门工作。

Last Updated:

网络空间安全(Cyber Security),培训,课程,培训课程, 企业Cybersecurity培训, 短期Cybersecurity培训, Cybersecurity课程, 网络空间安全(Cyber Security)周末培训, Cybersecurity晚上培训, 网络空间安全(Cyber Security)训练, 学习网络空间安全(Cyber Security), Cybersecurity老师, 学网络空间安全(Cyber Security)班, Cybersecurity远程教育, 一对一Cybersecurity课程, 小组网络空间安全(Cyber Security)课程, Cybersecurity培训师, Cybersecurity辅导班, 网络空间安全(Cyber Security)教程, Cybersecurity私教, 网络空间安全(Cyber Security)辅导, Cybersecurity讲师Cybersecurity,培训,课程,培训课程, 企业Cybersecurity培训, 短期Cyber Security培训, Cyber Security课程, Cybersecurity周末培训, Cyber Security晚上培训, Cybersecurity训练, 学习Cybersecurity, Cyber Security老师, 学Cyber Security班, Cybersecurity远程教育, 一对一Cyber Security课程, 小组Cyber Security课程, Cyber Security培训师, Cybersecurity辅导班, Cybersecurity教程, Cybersecurity私教, Cyber Security辅导, Cybersecurity讲师

促销课程

订阅促销课程

为尊重您的隐私,我公司不会把您的邮箱地址提供给任何人。您可以享有优先权和随时取消订阅的权利。

我们的客户

is growing fast!

We are looking to expand our presence in China!

As a Business Development Manager you will:

  • expand business in China
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!

该网站在其他国家/地区