Course Code: 100034
IBM® Security QRadar® enables you to minimize the time gap between when a suspicious activity occurs and when you detect it.
Course Code: 100314
New – SonicWall Network Security Professional teaches you how to monitor, investigate, analyze & configure SonicWall Next‐Gen firewalls running SonicOS. Enroll today!
Course Code: 100373
Learn the most effective steps to prevent cyberattacks and detect adversaries with actionable techniques in your org. Select your Virtual Classroom today!
Course Code: 840017
Dive into the rapidly evolving world of Machine Learning Operations (MLOps) and AI Security with our intensive 3-day boot camp. MLOps bridges the gap between data science and operation teams, delivering continuous collaboration and integration to drive the efficient...
Course Code: 840100
Exclusive – This course is designed to equip you with the essential knowledge and skills to master complex IAM practices and strategies. We will cover various advanced concepts, frameworks, and technologies that are pivotal in securing and managing digital identities within an o...
Course Code: 840101
Exclusive – This course is designed to equip cybersecurity professionals with the essential knowledge and skills required to effectively manage and mitigate cybersecurity incidents. Learn various components and phases of incident response frameworks, explore state-of-the-art too...
Course Code: 840103
Exclusive – Cybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, a key component in modern cybersecurity strategies. Participants will learn to identify, analyze, and mitigate potential security threats in complex systems. The course...
Course Code: 910028
Machine Learning (ML) Engineering on Amazon Web Services (AWS) is a 3-day intermediate course designed for ML professionals seeking to learn machine learning engineering on AWS.
The opportunities and challenges bring your own device (BYOD) represents are real; enterprises must make their network infrastructure BYOD-ready to meet the onslaught.
Learn more about data breaches on a large-scale level and what can and can't be done about them.