Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

78 Results Found for "power bi"

Results per page: 10 40 80

EXP-301 – Windows User Mode Exploit Development

Course Code: 840107

PEN-300 explores advanced penetration testing techniques. Learners gain experience bypassing security defenses and crafting custom exploits in real-world scenarios, enhancing expertise in ethical hacking and vulnerability assessment

Delivery Formats

Data Protection for Mobile Phones

Video | Oct. 11, 2018

Learn basic mobile phone security practices to lock down this potential entry point to your corporate systems.

Network Forensics for Attack Mitigation

White Paper | June 11, 2015

Learn about the importance of network forensics for system monitoring and attack mitigation.

Defensive Cyberspace Operations Engineer (DCOE)

Course Code: 9733

Develop cyberspace operations skills and obtain a DCO-based certification.

Delivery Formats

Check Point Certified Security Administration (CCSA)

Course Code: 3442

NewWhat is CCSA? With our new and exclusive course, learn how to configure Check Point Security Gateways and Management Software Blades within your organization.

Delivery Formats

Check Point Certified Security Expert (CCSE)

Course Code: 3441

NewIn this course, you will learn how to effectively build, modify, deploy and troubleshoot Check Point Security systems on the GAiA OS. Advance your career today!

Delivery Formats

Check Point Cybersecurity Boot Camp (CCSA+CCSE)

Course Code: 3443

NewLearn to configure Check Point Security Gateway and Management Software Blades, as well as how to build, modify, deploy, & troubleshoot CPS systems on GAiA OS.

Delivery Formats

PEN-200 - Penetration Testing with Kali Linux (PWK/OSCP)

Course Code: 840104

The industry-leading Penetration Testing with Kali Linux (PWK/PEN-200) course introduces penetration testing methodology, tools, and techniques in a hands-on, self-paced environment.

Delivery Formats

10 Things Security Experts Wish End Users Knew

White Paper | April 08, 2021

Cybersecurity is an essential business operation more than ever before. In this article, we present 10 things cybersecurity experts wish end users knew.

10 Ways Everyone Should Approach Cybersecurity in 2015

White Paper | Feb. 13, 2015

James Michael Stewart discusses 10 ways everyone should focus on key issues regarding to approaching Cybersecurity in 2015 for their organization. Learn more.