Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

9 Results Found for "microsoft excel"

Results per page: 10 40 80

Introduction to Cyber Warfare and Operations Design (ICWOD)

Course Code: 9719

This course provides a basic understanding of full-spectrum cyberspace operations; the complexities of the cyberspace environment; and planning, organizing, and integrating cyber ops. The course consists of presentations and exercises that teach students how to desig...

Delivery Formats

Defensive Cyberspace Operations Engineer (DCOE)

Course Code: 9733

Develop cyberspace operations skills and obtain a DCO-based certification.

Delivery Formats

10 Ways Everyone Should Approach Cybersecurity in 2015

White Paper | Feb. 13, 2015

James Michael Stewart discusses 10 ways everyone should focus on key issues regarding to approaching Cybersecurity in 2015 for their organization. Learn more.

Cybersecurity Specialization: Threat Modeling

Course Code: 840103

ExclusiveCybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, a key component in modern cybersecurity strategies. Participants will learn to identify, analyze, and mitigate potential security threats in complex systems. The course...

Delivery Formats

10 Security Concerns for Cloud Computing

White Paper | March 11, 2010

Before implementing Cloud Computing, it's important to consider the security - learn the risks & benefits to be sure it is the right solution for you.

CHFI - Computer Hacking Forensic Investigator

Course Code: 3401

Prepare for the CHFI certification, this course covers major forensic investigation scenarios that enable you to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.

Delivery Formats

Palo Alto Networks: Cortex XSIAM for Investigation and Analysis

Course Code: 842007

XSIAM is the industry's most comprehensive security incident and asset management platform, offering extensive coverage for securing and managing infrastructure, workloads, and applications across multiple environments. This course reviews XSIAM intricacies, from fun...

Delivery Formats

Data Breaches: What Can and Cannot Be Done

White Paper | Aug. 23, 2015

Learn more about data breaches on a large-scale level and what can and can't be done about them.

Success in the Digital Age: The Value of Investing in People

Special Report | July 06, 2018

Discover the value paradigm shift to investing in people, the benefits associated with developing the right skills, where critical skills are needed and the business drivers behind them. We also provide ideas on how to convert customers into assets through customer education. DOWNLOAD NOW >