This instructor-led, live training in 中国 (online or onsite) is aimed at IT professionals who wish to understand how to use the CipherTrust Solution suite.
By the end of this training, participants will be able to:
Understand the CipherTrust Solution and its basic functions.
This instructor-led, live training in 中国 (online or onsite) is aimed at experienced developers who wish to gain a comprehensive understanding of Python programming and its applications in cybersecurity.
By the end of this training, participants will be able to:
Use Python programming for defensive cybersecurity.
Understand and use Python for ethical offensive techniques and digital forensics tasks.
Recognize legal and ethical considerations surrounding offensive cybersecurity and vulnerability disclosure.
This instructor-led, live training in 中国 (online or onsite) is aimed at developers, engineers, and architects seeking to secure their web apps and services.
By the end of this training, participants will be able to integrate, test, protect, and analyze their web apps and services using the OWASP testing framework and tools.
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
The purpose of the Ethical Hacking Training is to:
Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
Inform the public that credentialed individuals meet or exceed the minimum standards.
Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
The Course is ideal for those working in positions such as, but not limited to:
In this instructor-led, live training 中国 (online or onsite), we discuss CAS's architecture and features and practice installing and configuring a CAS server.
By the end of this training, participants will be able to:
Have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication).
Have the necessary practice to deploy and manage their own authentication server.
Internet of Things (IoT)是一种网络基础设施,可以无线连接物理对象和软件应用程序,允许它们相互通信并通过网络通信,云计算和数据捕获交换数据。部署物联网解决方案的主要障碍之一是安全性。由于物联网技术涉及广泛的设备,因此设计物联网安全对于成功部署物联网至关重要。 在以讲师为主导的现场培训中,参与者将了解Internet of Things (IoT)架构,并了解适用于其组织的不同物联网安全解决方案。 在培训结束时,参与者将能够:
This course is designed to help the attendee to build organizational resilience against a range of threats so that organizations can respond effectively to incidents, maintain the availability of business operations and safeguard its interests.
This course explore the technical skills to implement, monitor and administer IT infrastructure using information security policies and procedures. And how to protecting the confidentiality, integrity and availability of data.