Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

22 Results Found for "IOT"

Results per page: 10 40 80

Check Point Certified Security Administration (CCSA)

Course Code: 3442

NewWhat is CCSA? With our new and exclusive course, learn how to configure Check Point Security Gateways and Management Software Blades within your organization.

Delivery Formats

Check Point Cybersecurity Boot Camp (CCSA+CCSE)

Course Code: 3443

NewLearn to configure Check Point Security Gateway and Management Software Blades, as well as how to build, modify, deploy, & troubleshoot CPS systems on GAiA OS.

Delivery Formats

Security and the Rise of Machine-to-Machine (M2M) Communications

White Paper | Aug. 26, 2014

Kerry Doyle discusses Security and the Rise of Machine-to-Machine (M2M) Communications to help avoid any security risk in the future. Learn more here.

Top 10 Cybersecurity Risks: How Prepared Are You for 2013?

White Paper | Jan. 24, 2013

When it comes to cyber security, we have a lot to look out for, take precautions against and be paranoid about. Learn more about these cybersecurity risks here.

A Question about “Hacking Back” — Is it Legal?

Article | April 09, 2019

The purpose of a “hack back” is to identify an attacker and possibly recover stolen data in a retaliatory manner. Learn if there is a legal precedent to "hacking back."

The Next Cyberattack is Right Around the Corner—Are You Ready?

Article | Sep. 23, 2020

There’s a lot of pressure on IT decision-makers to fill the cybersecurity holes in their organization. The cyber skills shortage is palpable and growing. Cybersecurity is the most challenging IT hiring area in the world. Those of you expecting to hire your way out of your cyber skills gaps, we have some bad news for you—it’s not viable.

F5 Networks Configuring BIG-IP Advanced WAF: Web Application Firewall

Course Code: 100336

NewLearn how to defend against attacks using the F5 Web Application Firewall (WAF).

Delivery Formats

Network Forensics for Attack Mitigation

White Paper | June 11, 2015

Learn about the importance of network forensics for system monitoring and attack mitigation.

Cybersecurity Specialization: Threat Modeling

Course Code: 840103

ExclusiveCybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, a key component in modern cybersecurity strategies. Participants will learn to identify, analyze, and mitigate potential security threats in complex systems. The course...

Delivery Formats

CHFI - Computer Hacking Forensic Investigator

Course Code: 3401

Prepare for the CHFI certification, this course covers major forensic investigation scenarios that enable you to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Delivery Formats