Skip to main Content
What kind of cyber security training course are you looking for? Global Knowledge has a large portfolio to choose from. It doesn't matter if you want to build a safer infrastructure, want to become an ethical hacker or if you want to improve your data security. Global Knowledge has a training course that fits your needs.
CHECK OUT THE TRAINING COURSES

Download this Whitepaper

Download het e-Book

"How do you recognize the cyber criminal?"

Hey, Mark from Operations just texted, if you can transfer him some money. Without thinking - you transfer him the requested amount. But what if that message wasn't actually from Mark himself? It's only until later you find out you've transferred money to a complete stranger.

In the past, you'd just worry about viruses - but if you had a good virus scanner, that problem solved itself. But cyber criminals have long outsmarted virus scanners. What can you do to protect yourself from their tricks? What do you do when you become the target of a cyber criminal? Read it in the e-Book 'How do you recognize the cyber criminal?'. You can download it by clicking the button.

Follow your next cyber security training course at Global Knowledge

From ethical hacking to Incident Handling and Response and data security - it doesn't matter what kind of security training course you need. Global Knowledge has got you covered.

Promises, promises, right? Find out for yourself by browsing through the different security specializations underneath this text.

YOUR SECURITY SPECIALIZATION

Watch and read more about cyber security

What is an ethical hacker?

Jochen den Ouden is ethical hacker - he uses the skill- and mindset of a hacker to find vulnerabilities in the security of an organization. This is called Ethical Hacking.

LEARN MORE IN THE VIDEO

What can I expect of the CTIA-training course?

Of course you want to know what to expect before you decide to book a training course. Find out what to expect of the Certified Threat Intelligence Analyst certification in this article.

READ THE ARTICLE
CyberSecurity Way Out

What are the advantages of secure coding?

Secure coding takes time, but what do you get for the time you spend thinking about security while you're coding? Stuart Peck from ZeroDayLab explains.

WATCH THE VIDEO
Top Tech Trends 2019

Prepare yourself for a cyber attack with an Incident Handling and Response Plan

A cyber attack will not just cost you a lot of money - but the reputation of your company is on the line too. What can you do to protect yourself? Get an Incident Handling and Response plan ready. What?

FIND OUT MORE ABOUT THE PLAN

Video: Why is data security so important?

Uber, Deliveroo, Facebook, your favorite apps all need your data to give you what you need from them. Learn from Global Knowledge trainer Michiel Broekhuijsen why it's crucial to protect your data in this video.

WATCH THE VIDEO
Security Roadmap

Cyber Security Training Roadmap

Get your Cyber Security Roadmap and find out which training Courses you still need to do

LOOK AT THE MAP
Cookie Control toggle icon