Course Code: 9817
Prepare for the CISM exam with our best-of-breed prep course. This certification program is for experienced information security management professionals.
Course Code: 100034
IBM® Security QRadar® enables you to minimize the time gap between when a suspicious activity occurs and when you detect it.
Course Code: 100314
New – SonicWall Network Security Professional teaches you how to monitor, investigate, analyze & configure SonicWall Next‐Gen firewalls running SonicOS. Enroll today!
Course Code: 100373
Learn the most effective steps to prevent cyberattacks and detect adversaries with actionable techniques in your org. Select your Virtual Classroom today!
Course Code: 840100
Exclusive – This course is designed to equip you with the essential knowledge and skills to master complex IAM practices and strategies. We will cover various advanced concepts, frameworks, and technologies that are pivotal in securing and managing digital identities within an o...
Course Code: 840101
Exclusive – This course is designed to equip cybersecurity professionals with the essential knowledge and skills required to effectively manage and mitigate cybersecurity incidents. Learn various components and phases of incident response frameworks, explore state-of-the-art too...
Course Code: 840103
Exclusive – Cybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, a key component in modern cybersecurity strategies. Participants will learn to identify, analyze, and mitigate potential security threats in complex systems. The course...
Course Code: 910028
Machine Learning (ML) Engineering on Amazon Web Services (AWS) is a 3-day intermediate course designed for ML professionals seeking to learn machine learning engineering on AWS.
Course Code: 840110
The AAIA Certification Prep Course is designed to help professionals build the expertise needed to audit and govern AI systems with confidence. As artificial intelligence becomes integral to business operations, organizations face new challenges around ethics, compli...
The opportunities and challenges bring your own device (BYOD) represents are real; enterprises must make their network infrastructure BYOD-ready to meet the onslaught.