This instructor-led, live training in 横浜 (online or onsite) is aimed at advanced-level cybersecurity professionals, AI engineers, and IoT developers who wish to implement robust security measures and resilience strategies for Edge AI systems.
By the end of this training, participants will be able to:
Understand security risks and vulnerabilities in Edge AI deployments.
Implement encryption and authentication techniques for data protection.
Design resilient Edge AI architectures that can withstand cyber threats.
Apply secure AI model deployment strategies in edge environments.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level cybersecurity professionals and data scientists who wish to utilize LLMs for enhancing cybersecurity measures and threat intelligence.
By the end of this training, participants will be able to:
Understand the role of LLMs in cybersecurity.
Implement LLMs for threat detection and analysis.
Utilize LLMs for security automation and response.
Integrate LLMs with existing security infrastructure.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level to advanced-level cybersecurity professionals and technical leads who wish to understand how to implement AI models to enhance security processes, automate threat detection and response, and perform predictive analysis.By the end of this training, participants will be able to:
Understand the role of AI in modern cyber security.
Develop machine learning models for anomaly and threat detection.
Implement AI for automating incident response and security operations.
Evaluate the ethical and operational considerations of AI in cybersecurity.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level analysts who wish to effectively analyze, secure, and protect their organization's data and networks from cyber threats.
By the end of this training, participants will be able to:
Gain a comprehensive understanding of the current cybersecurity landscape.
Learn and apply industry-standard cybersecurity frameworks (e.g., NIST, ISO/IEC 27001) and best practices to enhance the security posture of their organization.
Implement effective network security measures, including configuring firewalls, VPNs, IDS/IPS systems, and applying encryption techniques to protect data at rest and in transit.
Identify, analyze, and respond to cybersecurity incidents using threat intelligence, SIEM tools, and incident response plans.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level network administrators who wish to gain the essential skills to manage, administer, monitor, and maintain Fortinet security systems.
By the end of this training, participants will be able to:
Configure and manage FortiGate firewalls.
Monitor network traffic and manage incidents with FortiAnalyzer.
Automate tasks and manage policies through FortiManager.
Apply preventive maintenance strategies and troubleshoot network issues.
This instructor-led, live training in 横浜 (online or onsite) is aimed at beginner-level network administrators who wish to use FortiGate 1100E to manage and secure their network environments effectively.
By the end of this training, participants will be able to:
Understand the basic architecture and features of FortiGate 1100E.
Learn how to deploy FortiGate 1100E in various network environments.
Gain hands-on experience with basic configuration and management tasks.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level network administrators who wish to manage and secure their networks using FortiGate firewalls.
By the end of this training, participants will be able to:
Understand Fortigate features and functionalities, particularly those introduced or enhanced in version 7.4.
Configure and manage FortiGate devices and implement advanced security features.
Deploy and manage advanced security measures like IPS, antivirus, web filtering, and threat management.
Monitor network activities, analyze logs, and generate reports for auditing and compliance.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level technical professionals who wish to delve deeper into the technical aspects and functionalities of Fortinet’s product line to effectively recommend, sell, and implement Fortinet security solutions.
By the end of this training, participants will be able to:
Gain in-depth knowledge of Fortinet’s advanced security solutions and products.
Understand the technical features, benefits, and deployment scenarios for each core Fortinet product.
Configure, manage, and troubleshoot Fortinet solutions in diverse environments.
Apply Fortinet products to address complex security challenges and requirements.
This instructor-led, live training in 横浜 (online or onsite) is aimed at security professionals who wish to learn how to use Cortex XDR in preventing and stopping the occurrence of sophisticated attacks and threats.
By the end of this training, participants will be able to:
Understand the architecture and components of Cortex XDR.
Create and manage profiles for exploit and malware prevention.
Analyze behavioral threats and monitor response actions.
This instructor-led, live training in 横浜 (online or onsite) is aimed at beginner-level technical professionals who wish to learn the concept of the Security Fabric and how it evolved to address the cybersecurity needs of organizations.
By the end of this training, participants will be able to:
Learn the evolution of cybersecurity and how it has shaped current security technologies.
Use Fortinet products to protect against specific types of cyber threats and attacks.
Understand the integration and automation capabilities of Fortinet solutions in providing a coordinated response to cyber incidents.
This instructor-led, live training in 横浜 (online or onsite) is aimed at experienced developers who wish to gain a comprehensive understanding of Python programming and its applications in cybersecurity.
By the end of this training, participants will be able to:
Use Python programming for defensive cybersecurity.
Understand and use Python for ethical offensive techniques and digital forensics tasks.
Recognize legal and ethical considerations surrounding offensive cybersecurity and vulnerability disclosure.
This instructor-led, live training in 横浜 (online or onsite) is aimed at security professionals who wish to learn how to troubleshoot Palo Alto Networks' next-generation firewalls.
By the end of this training, participants will be able to:
Understand the architecture of the next-generation firewall.
Investigate and troubleshoot networking issues using firewall tools.
Analyze advanced logs to resolve real-life scenarios.
This instructor-led, live training in 横浜 (online or onsite) is aimed at beginner-level network security professionals who wish to learn the concept of cybersecurity and the current global threat landscape.
By the end of this training, participants will be able to:
Understand the current global threat landscape and identify the main types of cyber adversaries.
Recognize the primary types of malware and the mechanics of cyber attacks.
Understand the basics of network security and the importance of a layered security approach.
Learn about Fortinet's Security Fabric and how it addresses modern cybersecurity challenges.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level network and security professionals who wish to effectively manage and secure networks using Fortigate 600E equipment, with a specific focus on HA configurations for enhanced reliability and performance.
By the end of this training, participants will be able to:
Understand the features, specifications, and operating principles of the Fortigate 600E firewall.
Perform the initial setup of the Fortigate 600E, including basic configuration tasks like setting up interfaces, routing, and initial firewall policies.
Configure and manage advanced security features such as SSL VPN, user authentication, antivirus, IPS, web filtering, and anti-malware capabilities to protect against a variety of network threats.
Troubleshoot common issues in HA setups and effectively manage HA environments.
This instructor-led, live training in 横浜 (online or onsite) is aimed at security professionals who wish to learn how to manage firewalls at scale.
By the end of this training, participants will be able to:
Design, configure, and manage the Panorama FireWall management server.
Manage policies using device groups.
Roll out network configurations to different firewalls.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level AI and cybersecurity professionals who wish to understand and address the security vulnerabilities specific to AI models and systems, particularly in highly regulated industries such as finance, data governance, and consulting.
By the end of this training, participants will be able to:
Understand the types of adversarial attacks targeting AI systems and methods to defend against them.
Implement model hardening techniques to secure machine learning pipelines.
Ensure data security and integrity in machine learning models.
Navigate regulatory compliance requirements related to AI security.
This instructor-led, live training in 横浜 (online or onsite) is aimed at experienced network security managers who wish to gain the knowledge and skills needed to deploy, manage, and troubleshoot Fortinet's FortiGate security appliances running on FortiOS 7.2 as an NSE4 Network Security Professional.
By the end of this training, participants will be able to:
Understand Fortinet's product portfolio and the role of FortiOS in network security.
This instructor-led, live training in 横浜 (online or onsite) is aimed at security professionals who wish to learn the fundamentals of managing Palo Alto Networks' next-generation firewalls.
By the end of this training, participants will be able to:
Configure and manage Palo Alto Networks' firewall essential features.
This instructor-led, live training in 横浜 (online or onsite) is aimed at sysadmins who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
By the end of this training, participants will be able to:
Install and configure 389 Directory Server.
Understand the features and architecture of 389 Directory Server.
Learn how to configure the directory server using the web console and CLI.
Set up and monitor replication for high availability and load balancing.
Manage LDAP authentication using SSSD for faster performance.
Integrate 389 Directory Server with Microsoft Active Directory.
This instructor-led, live training in 横浜 (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
Set up and configure Active Directory.
Set up a domain and define access rights of users and devices.
Manage users and machines through Group Policies.
Control access to file servers.
Set up a Certificate Service and manage certificates.
Implement and manage services such as encryption, certificates, and authentication.
Android is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. The course gives a comprehensive overview of these features, and points out the most critical shortcomings to be aware of related to the underlying Linux, the file system and the environment in general, as well as regarding using permissions and other Android software development components.
Typical security pitfalls and vulnerabilities are described both for native code and Java applications, along with recommendations and best practices to avoid and mitigate them. In many cases discussed issues are supported with real-life examples and case studies. Finally, we give a brief overview on how to use security testing tools to reveal any security relevant programming bugs.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Learn the security solutions on Android
Learn to use various security features of the Android platform
Get information about some recent vulnerabilities in Java on Android
Learn about typical coding mistakes and how to avoid them
Get understanding on native code vulnerabilities on Android
Realize the severe consequences of unsecure buffer handling in native code
Understand the architectural protection techniques and their weaknesses
Get sources and further readings on secure coding practices
Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity – is given, while also presenting the typical problems that may damage these requirements along with real-world solutions.
As a critical aspect of network security is cryptography, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical background, these elements are discussed from a developer's perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.
Typical crypto vulnerabilities are discussed both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.
Finally, as XML technology is central for data exchange by networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages alongside protection measures such as XML signature and XML encryption – as well as weaknesses in those protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Understand the requirements of secure communication
Learn about network attacks and defenses at different OSI layers
Have a practical understanding of cryptography
Understand essential security protocols
Understand some recent attacks against cryptosystems
Get information about some recent related vulnerabilities
Understand security concepts of Web services
Get sources and further readings on secure coding practices
This three day course covers the basics of securing the C/C++ code against the malicious users who may exploit many vulnerabilities in the code with memory management and input handling, the course cover the principals of writing secure code.
Even experienced Java programmers are not mastering by all means the various security services offered by Java, and are likewise not aware of the different vulnerabilities that are relevant for web applications written in Java.
The course – besides introducing security components of Standard Java Edition – deals with security issues of Java Enterprise Edition (JEE) and web services. Discussion of specific services is preceded with the foundations of cryptography and secure communication. Various exercises deal with declarative and programmatic security techniques in JEE, while both transport-layer and end-to-end security of web services is discussed. The use of all components is presented through several practical exercises, where participants can try out the discussed APIs and tools for themselves.
The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform and web-related vulnerabilities. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
Understand security concepts of Web services
Learn to use various security features of the Java development environment
Have a practical understanding of cryptography
Understand security solutions of Java EE
Learn about typical coding mistakes and how to avoid them
Get information about some recent vulnerabilities in the Java framework
Get practical knowledge in using security testing tools
Get sources and further readings on secure coding practices
Description
The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only know how to use the various security features of the Java environment (positive security), but should also be aware of the numerous vulnerabilities that are still relevant for Java development (negative security).
The introduction of security services is preceded with a brief overview of the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of these components is presented through several practical exercises, where participants can try out the discussed APIs for themselves.
The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform, covering both the typical bugs committed by Java programmers and the language- and environment-specific issues. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
Learn to use various security features of the Java development environment
Have a practical understanding of cryptography
Learn about typical coding mistakes and how to avoid them
Get information about some recent vulnerabilities in the Java framework
Get sources and further readings on secure coding practices
A number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.
The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more.
Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, while the discussion of vulnerabilities of the ASP.NET also deals with various environment settings and their effects. Finally, the topic of ASP.NET-specific vulnerabilities not only deals with some general web application security challenges, but also with special issues and attack methods like attacking the ViewState, or the string termination attacks.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
Learn to use various security features of the .NET development environment
Get practical knowledge in using security testing tools
Learn about typical coding mistakes and how to avoid them
Get information about some recent vulnerabilities in .NET and ASP.NET
Get sources and further readings on secure coding practices
The course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Understand Web vulnerabilities both on server and client side
Realize the severe consequences of unsecure buffer handling
Be informated about some recent vulnerabilities in development environments and frameworks
Learn about typical coding mistakes and how to avoid them
Understand security testing approaches and methodologies
The course provides essential skills for PHP developers necessary to make their applications resistant to contemporary attacks through the Internet. Web vulnerabilities are discussed through PHP-based examples going beyond the OWASP top ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload, and many others. PHP-related vulnerabilities are introduced grouped into the standard vulnerability types of missing or improper input validation, incorrect error and exception handling, improper use of security features and time- and state-related problems. For this latter we discuss attacks like the open_basedir circumvention, denial-of-service through magic float or the hash table collision attack. In all cases participants will get familiar with the most important techniques and functions to be used to mitigate the enlisted risks.
A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5. A number of security-related extensions to PHP are introduced like hash, mcrypt and OpenSSL for cryptography, or Ctype, ext/filter and HTML Purifier for input validation. The best hardening practices are given in connection with PHP configuration (setting php.ini), Apache and the server in general. Finally, an overview is given to various security testing tools and techniques which developers and testers can use, including security scanners, penetration testing and exploit packs, sniffers, proxy servers, fuzzing tools and static source code analyzers.
Both the introduction of vulnerabilities and the configuration practices are supported by a number of hands-on exercises demonstrating the consequences of successful attacks, showing how to apply mitigation techniques and introducing the use of various extensions and tools.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
Learn client-side vulnerabilities and secure coding practices
Have a practical understanding of cryptography
Learn to use various security features of PHP
Learn about typical coding mistakes and how to avoid them
Be informed about recent vulnerabilities of the PHP framework
Get practical knowledge in using security testing tools
Get sources and further readings on secure coding practices
The Combined SDL core training gives an insight into secure software design, development and testing through Microsoft Secure Development Lifecycle (SDL). It provides a level 100 overview of the fundamental building blocks of SDL, followed by design techniques to apply to detect and fix flaws in early stages of the development process.
Dealing with the development phase, the course gives an overview of the typical security relevant programming bugs of both managed and native code. Attack methods are presented for the discussed vulnerabilities along with the associated mitigation techniques, all explained through a number of hands-on exercises providing live hacking fun for the participants. Introduction of different security testing methods is followed by demonstrating the effectiveness of various testing tools. Participants can understand the operation of these tools through a number of practical exercises by applying the tools to the already discussed vulnerable code.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Get known to the essential steps of Microsoft Secure Development Lifecycle
Learn secure design and development practices
Learn about secure implementation principles
Understand security testing methodology
Get sources and further readings on secure coding practices
After getting familiar with the vulnerabilities and the attack methods, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. Security testing should start with information gathering about the system (ToC, i.e. Target of Evaluation), then a thorough threat modeling should reveal and rate all threats, arriving to the most appropriate risk analysis-driven test plan.
Security evaluations can happen at various steps of the SDLC, and so we discuss design review, code review, reconnaissance and information gathering about the system, testing the implementation and the testing and hardening the environment for secure deployment. Many security testing techniques are introduced in details, like taint analysis and heuristics-based code review, static code analysis, dynamic web vulnerability testing or fuzzing. Various types of tools are introduced that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute these tools to analyze the already discussed vulnerable code. Many real life case studies support better understanding of various vulnerabilities.
This course prepares testers and QA staff to adequately plan and precisely execute security tests, select and use the most appropriate tools and techniques to find even hidden security flaws, and thus gives essential practical skills that can be applied on the next day working day.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
Learn client-side vulnerabilities and secure coding practices
Understand security testing approaches and methodologies
Get practical knowledge in using security testing techniques and tools
Get sources and further readings on secure coding practices
Protecting applications that are accessible via the web requires well-prepared security professional who are at all time aware of current attack methods and trends. Plethora of technologies and environments exist that allow comfortable development of web applications. One should not only be aware of the security issues relevant to these platforms, but also of all general vulnerabilities that apply regardless of the used development tools.
The course gives an overview of the applicable security solutions in web applications, with a special focus on understanding the most important cryptographic solutions to be applied. The various web application vulnerabilities are presented both on the server side (following the OWASP Top Ten) and the client side, demonstrated through the relevant attacks, and followed by the recommended coding techniques and mitigation methods to avoid the associated problems. The subject of secure coding is wrapped up by discussing some typical security-relevant programming mistakes in the domain of input validation, improper use of security features and code quality.
Testing plays a very important role in ensuring security and robustness of web applications. Various approaches – from high level auditing through penetration testing to ethical hacking – can be applied to find vulnerabilities of different types. However, if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well planned and properly executed. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find one exploitable vulnerability to penetrate into it.
Practical exercises will help understanding web application vulnerabilities, programming mistakes and most importantly the mitigation techniques, together with hands-on trials of various testing tools from security scanners, through sniffers, proxy servers, fuzzing tools to static source code analyzers, this course gives the essential practical skills that can be applied on the next day at the workplace.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
Learn client-side vulnerabilities and secure coding practices
Have a practical understanding of cryptography
Understand security testing approaches and methodologies
Get practical knowledge in using security testing techniques and tools
Be informed about recent vulnerabilities in various platforms, frameworks and libraries
Get sources and further readings on secure coding practices
Cyber Security is the practice of applying technologies, controls, and processes to protect computer systems, servers, networks, devices, programs, and data from malicious cyber attacks.
This instructor-led, live training (online or onsite) is aimed at anyone who wish to learn how to protect internet-connected systems from different kinds of cyber threats.
By the end of this training, participants will be able to:
Understand the concept of Cyber Security.
Learn and understand the different Cyber Security threats.
Learn processes and best practices to protect internet-connected systems from cyber attacks.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in 横浜 (online or onsite) is aimed at IT professionals who wish to learn and apply the fundamentals of Cybersecurity practices, processes, and tools in their organization.
By the end of this training, participants will be able to:
Understand the Cybersecurity concepts, definitions, architecture, and principles.
Learn how to secure and protect digital assets (networks, systems, applications, and data).
Implement security models, frameworks, operational techniques, and incident handling.
Evaluate and mitigate the impact of cyber attacks, risks, threats, and vulnerabilities.
Gain insights on cybersecurity challenges with emerging technologies.
This instructor-led, live training in 横浜 (online or onsite) is aimed at software engineers and IT professionals who wish to gain a deeper knowledge on CyBOK and strengthen theoretical and applied skills in cyber security.
By the end of this training, participants will be able to:
Understand the fundamental concepts, definitions, and principles of cyber security.
Acquire in-depth expertise in cyber security by implementing the CyBOK knowledge areas.
Gain extensive and foundational knowledge to operationalize the CyBOK framework.
Facilitate community and organization enablement to increase focus on data security and privacy.
Expand opportunities to earn specialization and credentials for cyber security professions.
The course is intended for those requiring intelligence or evidence from the Dark Web. This will usually be those working in government or law enforcement though may also be in the private sector.
In this instructor-led, live course in 横浜, participants will learn how to formulate the proper security strategy to face the DevOps security challenge.
This course provides leaders and managers with an overview of issues and activities associated with cybersecurity.
Leaders will receive information in various topics that will build their knowledge and hone executive decision-making in regard to the cybersecurity threat.
By the end of this training, participants will be able to:
Understand the Internet, social network Privacy
Know PII and why it is important
Know how to secure the Online Activates
Know how to maintain the Privacy of business users
Know more of the Cyber laws that protect the Privacy
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in 横浜 (online or onsite) is aimed at security engineers and system administrators who wish to use FortiGate NGFW's advanced security-driven network systems to protect their organization from internal and external threats.
By the end of this training, participants will be able to:
Install and configure the preferred FortiGate NGFW software and hardware model.
Operate and employ FortiGate NGFW to improve the efficiency of system administration tasks.
Manage various forms of external and internal threats using FortiGate features.
Integrate FortiGate security fabric with the entire IT infrastructure to provide quick automated protection.
Ensure long-term protection from attacks with independent and continuous FortiGate threat intelligence.
Troubleshoot the most common firewall system setup errors relevant to FortiGate NGFWs.
Implement Fortinet security solutions in other enterprise applications.
This instructor-led, live training in 横浜 (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize the authentication, authorization and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
Install and configure FreeIPA.
Manage Linux users and clients from a single central location.
Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
Enable Single Sign On authentication across all systems, services and applications.
This instructor-led, live training in 横浜 (online or onsite) is aimed at software testers who wish to protect their organization's network with Nmap.
By the end of this training, participants will be able to:
Set up the necessary testing environment to start using Nmap.
Scan network systems for security vulnerabilities.
This instructor-led, live training in 横浜 (online or onsite) is aimed at system administrators who wish to use Okta for identity and access management.
By the end of this training, participants will be able to:
Configure, integrate, and manage Okta.
Integrate Okta into an existing application.
Implement security with multi-factor authentication.
OpenLDAP is open source software for implementing the LDAP (Lightweight Directory Access Protocol), which allows management and access to information directories. Jest is a popular directory server that can be used to store and share data about users, groups, network resources and other objects on the network.
This instructor-led, live training in 横浜 (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.By the end of this training, participants will be able to:
Understand the structure and operation of LDAP directories.
Install and configure OpenLDAP for various deployment environments.
Implement access control, authentication, and replication mechanisms.
Use OpenLDAP with third-party services and applications.
This instructor-led, live training in 横浜 (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
Set up the necessary server environment to start configuring authentication and access controls using OpenAM.
Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
Access and manage authentication, authorization, and identity services through REST APIs.
This instructor-led, live training in 横浜 (online or onsite) is aimed at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
Install and configure OpenDJ.
Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.
In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.
By the end of this training, participants will be able to:
Install and configure OpenVAS
Learn the fundamental features and components of OpenVAS
Configure and implement network vulnerability scans with OpenVAS
Review and interpret OpenVAS scan results
Audience
Network engineers
Network administrators
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in 横浜 (online or onsite) is aimed at developers who wish to prevent malware intrusion with Palo Alto Networks.
By the end of this training, participants will be able to:
Set up the necessary development environment to start developing firewalls.
This instructor-led, live training in 横浜 (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
Gain visibility into enterprise data across on-premise and cloud environments.
Automate security intelligence to hunt threats and to contain risks.
This course covers the secure coding concepts and principals with Java through Open Web Application Security Project (OWASP) methodology of testing. The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
This course covers the secure coding concepts and principals with ASP.net through the Open Web Application Security Project (OWASP) methodology of testing , OWASP is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.
This Course explores the Dot Net Framework Security features and how to secure web applications.
続きを読む...
Last Updated:
お客様の声 (25)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.
Colin Donohue - Technological University of the Shannon: Midlands Midwest
コース - FortiGate 7.4 Administration
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
コース - Secure Developer Java (Inc OWASP)
The report and rules setup.
Jack - CFNOC- DND
コース - Micro Focus ArcSight ESM Advanced
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
コース - Ethical Hacker
Machine Translated
たくさんのことを学び、得た知識は仕事に活かせます!
Artur - Akademia Lomzynska
コース - Active Directory for Admins
Machine Translated
トレーナー(オーグスティン)のオーラルスキルと人間的な側面。
Jeremy Chicon - TE Connectivity
コース - NB-IoT for Developers
Machine Translated
サイバーセキュリティに関するさまざまなテーマについての知識をリフレッシュするのは楽しかったです。私はサイバー攻撃、それがどのように起こるのか、そしてリスクを軽減するために(組織として)何ができるのか、ということにますます興味を持ちました。私はサイバー攻撃における AI に関する質問をしましたが、その回答はその場で実際の例を挙げて非常に深く興味深いものでした。
Siobhan
コース - Executive Cyber Security Awareness
Machine Translated
Azure Web セキュリティ、それは私が期待していたもの以上でした、私の仕事では絶対に行わない侵入テストでした
Toby
コース - Application Security in the Cloud
Machine Translated
I enjoyed the whole training session, very handy for a potential new career option, which i have been considering.
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
コース - Basel III – Certified Basel Professional
Real-life examples.
Kristoffer Opdahl - Buypass AS
コース - Web Security with the OWASP Testing Framework
Questions, that helps me a lot to understand the characteristics of CRISC examination.
Masakazu Yoshijima - Bank of Yokohama, Ltd.
コース - CRISC - Certified in Risk and Information Systems Control
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
コース - Secure Developer .NET (Inc OWASP)
The trainer was extremely knowledgable and helpful. While walking through the exercises, I wasn't rushed and was allowed to make mistakes (to a point) and then help was given to correct to them where needed.