IT-kurs
Du har valgt: Sikkerhetskurs for IT
Nullstill
Filter
Ferdig

-

Lysaker 2 dager 12 500 kr
23 Aug
28 Sep
GDPR Foundation gjør deg i stand til å tilegne deg kunnskap om basiselementene som kreves for å implementere og vedlikeholde et etterlevelsesverktøy med tanke på å beskyt... [+]
Kursets oppbygning Dag 1: Introduksjon til GDPR 1.     Kursets mål og struktur 2.     Personvernforordningen (GDPR) 3.     Personvernprinsipper, utfordringer og problemer 4.     Den registrertes rettigheter 5.     Behandlingsansvarlig, databehandler og personvernombud 6.     Tilsynsmyndigheter   Dag 2: Forberedelser til GDPR og sertifiseringseksamen 1.     Plan for kartlegging av opplysninger 2.     Risikovurdering under GDPR 3.     Vurdering av personvernkonsekvenser 4.     Personvernvurdering 5.     Overføring av personopplysninger til tredjeparter 6.     Rettskrav, forpliktelser og bøter 7.     Sertifiseringsprosessen og avslutning av forelesningen        Kursets læringstilnærming Forelesningsøktene illustreres med praktiske spørsmål og eksempler Praktiske øvelser inkluderer eksempler og diskusjoner Øvelsene i kursmaterialet er sammenlignbare med spørsmål man vil kunne få på eksamen Generell informasjon Kursmateriell og eksamen + sertifiseringsavgift er inkludert i prisen Kursmateriellet inneholder over 200 sider med teori og praktiske eksempler Et deltakelsesdiplom på 14 CPD (Continuing Professional Developing credits) vil bli utstedt Eksamen “PECB Certified GDPR Foundation” eksamen tilfredsstiller alle krav fra “PECB Examination and Certification Programme (ECP)”. Eksamen dekker følgende områder: Område 1: Grunnleggende prinsipper og konsepter i GDPROmråde 2: GDPR Varighet: 1 time (+ 10 minutter for personer som ikke har engelsk som førstespråk).  Eksamensform: Multiple Choice «lukket bok»-eksamen hvor kandidaten ikke har anledning til å benytte annet enn eksamenspapirene og penn. Hvis du ikke består eksamen første gang, kan du ta den på nytt innen 12 måneder uten ekstra kostnad. Etter bestått eksamen kan du søke om tittelen «PECB Certified GDPR Foundation». [-]
Les mer
Lysaker 3 timer 2 490 kr
07 Sep
Kurset «Introduksjon til GDPR» tar for seg sentrale begreper innen GDPR, og gir en teoretisk innføring i personvernforordningen med praktiske oppgaver underveis. [+]
Kurset vil gi en god og overordnet innsikt i hvilke krav som stilles til en virksomhet for at den skal være i stand til å opptre i henhold til kravene i GDPR. Ved å delta på «Introduksjon til GDPR» vil du som deltaker få både teoretiske og praktiske tips til hvordan man tilnærmer seg GDPR på en god og systematisk måte. Du vil tilegne deg kunnskap du kan benytte til å revidere eksisterende dokumentasjon og iverksette nye personverntiltak i din organisasjon. Kurset vil dekke følgende temaer: Definisjoner Grunnprinsippene i GDPR Hva er personopplysninger og sensitive personopplysninger? Hva er en behandlingsansvarlig? Hva er en databehandler? Databehandleravtale Behandlingsgrunnlag Krav til samtykke De registrertes rettigheter Behandlingsprotokoll Sikkerhet ved behandling Krav til personvernombud, må virksomheten ha dette? Overtredelsesgebyrer Forslag til overordnet implementering i organisasjonen   Kurset arrangeres som klasseromskurs med deltakere fra ulike virksomheter. Orange Cyberdefense kan også tilby skreddersydde kurs til din virksomhet. Ta kontakt på kurs@no.orangecyberdefense.com for mer informasjon. [-]
Les mer
Nettstudier 1 dag 4 900 kr
02 Aug
21 Sep
14 Oct
Hvordan fylle rollen som personvernombud, og hva må du kunne. Ett kurs for deg som DPO og vil bli bedriftens kompetanse person på GDPR [+]
Personvernforordningen / General Data Protection Regulation (GDPR) Vi går gjennom de deler du må ha kompetanse om, og du får fyldig kursmateriale med deg hjem, slik at du enklere kan mester fagområdet etter kurset. Men på ettdagskurs er det ikke dybdegejnnomgang av områder som DPIA, teknologi og prosess rundt GAP planer. Du får alikevel med deg materiale så du kan lese etterpå. Hva er formålet med forordninga og hvordan forordningen er strukturert. Vi går gjennom  tilsynsmyndighet og hvilke innvirkninger den loven har på Norge, EU og andre land.  Du får kompetanse om hovedpunkter i forordningen med de viktige nøkkelkonsepter, kategorier for personlig informasjon og prinsipper for databeskyttelse. Den registrertes rettigheter og hvordan analyser utfordringer og problemer En viktig kompetanse som mange ikke kjenner godt nok er hvilke roller, forpliktelser og behandlingsaktiviteter som må mestres, så vi ser på personvernombudets betegnelser  Konsekvensanalyse av databeskyttelse og personvernombudet Behandlingsaktiviteter og personvernombudet  Kontrollers ansvar Personvernombudet sitt ansvarRegistrering av behandlingsaktiviteterSamarbeid med tilsynsmyndighetHvordan starte program for å etterleve personvernforordningenHvem må forholde seg til personvernforordningenMetoder og tilnærmingForbered program for personvernforordningenHvordan avdekke mangler  og i dentifiser strategiske målLedelsens ansvar og godkjenning [-]
Les mer
Nettstudier 2 semester 4 980 kr
På forespørsel
Trusselbildet, styringssystemer, rammer for sikkerhetsarbeidet, sikkerhetsstandardene ISO27001 og 27002, gap-analyse, risikoanalyse, sikkerhetspolicy, ulike sikringstilta... [+]
Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: IFUD1012 Internett og sikkerhet Innleveringer: Øvinger: 3 av 5 må være godkjent. Vurderingsform: Skriftlig eksamen, 3 timer (60 %). Det gjennomføres 3 obligatoriske større øvingsarbeider gruppevis underveis i kurset. Disse får en midlertidig vurdering/tilbakemelding og kan deretter leveres på nytt til en samlet sluttvurdering som teller 40 % på karakteren. Ansvarlig: Ole Christian Eidheim Eksamensdato: 12.12.13 / 26.05.14         Læremål: Etter å ha gjennomført emnet Informasjonssikkerhetsstyring skal studenten ha følgende samlede læringsutbytter: KUNNSKAPER:Kandidaten:- kan gjøre rede for hva informasjonssikkerhet betyr for en bedrifts økonomi og omdømme- kan gjøre rede for hva standardene ISO 27001 og ISO 27002 inneholder og hvordan de benyttes i sikkerhetsarbeidet- kjenner til prinsippene i Demmings sirkel og kunne redegjøre for betydningen av disse for det kontinuerlige sikkerhetsarbeidet- kjenner til en trinnvis plan for innføring av et styringssystem for informasjonssikkerhet (ISMS) og kunne redegjøre for de kritiske suksessfaktorene i hver av fasene- kan redegjøre for forutsetninger og tiltak for å skape en sikkerhetskultur i en bedrift- kan redegjøre for den trinnvise prosessen frem mot sertifisering av et ISMS eller produkt- kan redegjøre for rollen til målinger og evalueringer i sikkerhetsarbeidet FERDIGHETER:Kandidaten kan:- kartlegge trusselbildet for en konkret bedrift- gjennomføre en risikoanalyse for en bedrift på en strukturert og systematisk måte- innføre tiltak for å redusere risikoverdien for kartlagte trusler som har for høy risikoverdi- velge og utarbeide relevante sikkerhetspolicyer for en konkret bedrift- utarbeide forslag til en organisasjonsstruktur for sikkerhetsarbeidet i en konkret bedrift- analysere behovet for sertifisering av ISMS for en konkret bedrift og gi anbefalinger om veien dit GENERELL KOMPETANSE:Kandidaten kan:- kommunisere med og forstå brukernes behov- involvere de ansatte i endringsprosesser i bedriften og vite hvilke ressurser/kompetanse disse kan bidra med- involvere eksterne konsulenter i endringsprosesser i bedriften og vite hvilke ressurser/kompetanse disse kan bidra med Innhold:Trusselbildet, styringssystemer, rammer for sikkerhetsarbeidet, sikkerhetsstandardene ISO27001 og 27002, gap-analyse, risikoanalyse, sikkerhetspolicy, ulike sikringstiltak, sikkerhetskultur, sikkerhet i informasjonssystemer, veien til sertifisering, måling og evaluering, kontinuerlig forbedringLes mer om faget her Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Informasjonssikkerhetsstyring 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.    [-]
Les mer
Nettkurs 2 dager 15 000 kr
30 Aug
15 Nov
29 Nov
This course enables you to effectively secure your enterprise network by leverage the full potential of the Next-Generation FireWall. [+]
The Palo Alto Networks “Firewall: Improving Security Posture and Hardening PAN-OS” (EDU-214) course is an instructor-led training that will help you to: Determine the efficacy of your current security policies Develop workflows for managing your security posture Modify your existing policy set to implement Security Best Practices Monitor network traffic using the interactive web interface and firewall reports Utilize tools such as the BPA tool to understand your environment further This course enables you to effectively secure your enterprise network by leverage the full potential of the Next-Generation FireWall. Most firewall infrastructures have been migrated from a legacy firewall. However, such a like-for-like migration does not protect the network as it is missing the correct setup of all the threat prevention techniques offered by the Next-Generation FireWall. Implementing security best practice can be a serious challenge as it is often difficult to identify where to start and what combination of best practice is adequate for the environment. Therefore, the “Firewall: Improving Security Posture and Hardening PAN-OS” (EDU-214) course teaches not only security best practices but also the methodologies to apply them with minimal impact effectively. Best Practices & Real Life Experience Let the Experience and Passion of our instructor guide you – Consigas is an Authorized Global Training Partner and was recognised with the “Excellence in Training Award” in 2019 and 2016 by Palo Alto Networks. The difference is made by our instructors who have many years of field experience which they bring with them into the classroom. All of our instructors are security consultants that design, implement, migrate, manage and support Palo Alto Networks solutions all day, every day. It’s this experience that they bring into the classroom to explain not only the theory but how to use the FireWall in real-life. Customers tell us that this is most valuable for them and what differentiates our training from most other training partners.  Video Recordings It’s impossible to remember everything in live training, which is why we are recording the online class and share the video with you. If you like to start studying right away, we can share the videos of a previous course and lab access immediately once your booking is confirmed.  Lab Access for 3 monthsFor 3 month you will have access to your own dedicated lab which you can use not only during the course, but for full three month. Your virtual lab consists of a Windows Client, Palo Alto Networks FireWall and DMZ Linux Server with a lab guide for practical exercises. As a bonus, which is not officially part of the course, your lab features the Expedition Migration Tool and Minemeld.  Certification The Firewall: Improving Security Posture and Hardening PAN-OS (EDU-214) course is not linked to any Palo Alto Networks certification.   Kurset tilbys også som bedriftsinternt kurs, og arrangeres hos dere eller i våre lokaler, alt etter hva som passer best. Ta kontakt med oss og vi kan finne en god løsning sammen. [-]
Les mer
Nettkurs 5 dager 15 500 kr
Instructor-Led Virtual - Live Online Training 5 halve dager 10.00 - 14.00 [+]
The course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven troubleshooting methodologies specific to individual features Analyze advanced logs to resolve various real-life scenarios Solve advanced, scenario-based challenges   COURSE OBJECTIVESSuccessful completion of this three-day, instructor-led course will enhance the participant’s understanding of how to troubleshoot the full line of Palo Alto Networks® next-generation firewalls. Participants will receive hands-on opportunities to troubleshoot common problems related to the configuration and operation of the security features of the Palo Alto Networks® PAN-OS® operating system. Completion of this class will help participants develop an in-depth knowledge of how to troubleshoot visibility and control over applications, users, and content.   SCOPE Course level: Advanced Course duration: 3 days Course format: Lecture and hands-on labs Platform support: Palo Alto Networks® next-generation enterprise firewalls running the PAN-OS® operating system Language: Undervisning og dokumentasjon er på engelsk [-]
Les mer
Oslo 5 dager 25 000 kr
23 Aug
23 Aug
18 Oct
ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining ... [+]
ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establishing, implementing, managing and maintaining an Information Security Management System (ISMS) based on ISO/IEC 27001. Course description During this training course, you will also gain a thorough understanding of the best practices of Information Security Management Systems to secure the organization`s sensitive information and improve the overall performance and effectiveness. Course objectives Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Master the concepts, approaches, methods and techniques used for the implementation and effective management of an ISMS Learn how to interpret the ISO/IEC 27001 requirements in the specific context of an organization Learn how to support an organization to effectively plan, implement, manage, monitor and maintain an ISMS Acquire the expertise to advise an organization in implementing Information Security Management System best practices   Course outline Day 1:  Introduction to ISO/IEC 27001 and initiation of an ISMS Course objectives and structure Standards and regulatory frameworks Information Security Management System (ISMS) Fundamental principles of Information Security Management Systems Initiating the implementation of an ISMS Understanding the organization and clarifying the Information Security objectives Analysis of the existing management system Day 2:  Plan the implementation of an ISMS Leadership and approval of the ISMS project ISMS scope Information Security policies Risk assessment Statement of Applicability and top management`s decision to implement the ISMS Definition of the organizational structure of Information Security Day 3:  Implementation of an ISMS Definition of the document management process Design of security controls and drafting of specific policies & procedures Communication plan Training and awareness plan Implementation of security controls Incident Management Operations Management Day 4:  ISMS monitoring, measurement, continuous improvement and preparation for a certification audit Monitoring, measurement, analysis and evaluation Internal audit Management review Treatment of non-conformities Continual improvement Preparing for the certification audit Competence and evaluation of implementers Day 5:  Certification Exam Preparation for exam Exam   [-]
Les mer
Oslo 4 dager 20 000 kr
20 Sep
20 Sep
22 Nov
This 4-day course teaches the skills required to design, operate, and maintain your PKI system. [+]
Public Key Infrastructure (PKI) is a core service that facilitates authentication, encryption, and digital signing. This 4-day course teaches the skills required to design, operate, and maintain your PKI system. The training begins with an overview of cryptography and the working principals of algorithms. After gaining an understanding of certificates, you will learn about the considerations for designing a highly reliable Certification Authority structure. Practical implementation examples are given in both Windows and Linux environments. Use-cases show how PKI can be used for, among others, securing websites, encrypting storage, validating executable code, and protecting communication.   Course outline: Cryptography Basics: Introduction to Cryptography: Symmetric Cryptography Asymmetric Cryptography Hash Functions Security Goals Usage Scenarios Encryption Signing Components of PKI Algorithms, Protocols and Standards DES and 3DES RSA Object Identifiers X.500, X.509 PKCS#10, PKCS# Understanding Certificates Structure and Content Extensions Getting Started with CAs: Using External CAs Self-signed Certificates CA Hierarchy Writing Policies Certificate Policy Certification Practice Statement Windows Server Certificate Security Choosing an Architecture Implementing a CA Hierarchy Certificate Templates Issuing Certificates Certificate Renewal OpenSSL on Linux Maintaining a CA Verifying and Monitoring Backup Certificate Revocation Reasons for Revocation Methods of Revocation Checking Practical Applications: SSL for Web Server Internet Information Services (IIS) Apache (optional) Certificate-based Authentication Authentication User Authentication vs Server Authentication Considering Smart Card Logon Virtual Private Networking (optional) Wi-Fi with 802.1x Encrypting File System (EFS) Local EFS Encryption EFS Within a Domain Recovery Securing E-Mail Certificate Requirements Signing in Outlook Encryption in Outlook Code Signing Time Stamping Signing PowerShell Scripts (optional) Signing Visual Studio Files (optional) Signing Office VBScript Code Other PKI-Enable Applications   [-]
Les mer
Oslo 5 dager 25 000 kr
23 Aug
01 Nov
01 Nov
Obtain all the competences and knowledge necessary to lead all the processes for implementing and complying with the requirements of the General Data Protection Regulatio... [+]
Obtain all the competences and knowledge necessary to lead all the processes for implementing and complying with the requirements of the General Data Protection Regulation (GDPR) in an organization   Course description: The Certified Data Protection Officer training course enables you to develop the necessary knowledge, skills and competence to effectively implement, manage and align a privacy framework based on the General Data Protection Regulation requirements. After mastering all the necessary concepts of General Data Protection Regulation (GDPR), you can sit for the exam and apply for a “PECB Certified Data Protection Officer” credential. By holding a PECB Certified Data Protection Officer Certificate, you will demonstrate that you thoroughly understand the gap between the General Data Protection Regulation and the current organizational processes including: privacy policies, procedures, working instructions, consent forms, data protection impact assessments, in order to associate organizations in the adoption process to the new regulation. Course objectives: Understand the history of personal data protection in Europe Gain a comprehensive understanding of the concepts, approaches, methods and techniques required for the effective alignment with the General Data Protection Regulation Understand the new requirements that the General Data Protection Regulation brings for EU organizations and non-EU organizations and when it is necessary to implement them Acquire the necessary expertise to support an organization in assessing the implementation of these new requirements Learn how to manage a team implementing the GDPR Gain the knowledge and skills required to advise organizations on best practices in the management of personal data Acquire the expertise for analysis and decision making in the context of personal data protection   Course Agenda Day 1: Introduction to the GDPR and initiation of the GDPR Compliance  Course objective and structure General Data Protection Regulation Fundamental Principles of the GDPR Initiating the GDPR Implementation Understanding the Organization and Clarifying the Data Protection Objectives Analysis of the Existing System Day 2: Plan the Implementation of the GDPR Leadership and approval of the GDPR Compliance Project Data Protection Policy Definition of the Organizational Structure of Data Protection Data Classification Risk Assessment under the GDPR Day 3: Deploying the GDPR  Privacy Impact Assessment (PIA) Design of Security Controls and Drafting of Specific Policies & Procedures Implementation of Controls Definition of the Document Management Process Communication Plan Training and Awareness Plan Day 4: Monitoring and continuous improvement of GDPR compliance  Operations Management Incident Management Monitoring, Measurement, Analysis and Evaluation Internal Audit Data breaches and corrective actions Continual Improvement Competence, Evaluation and Closing the Training Day 5: Certification Exam  Preparation for exam Exam Exam and all necessary course material are included in the course Education approach Lecture sessions are illustrated with examples based on real case scenarios Practical exercises include real case scenarios, examples and discussions Practice tests are similar to the Certification Exam [-]
Les mer
Nettkurs 5 dager 25 000 kr
I dette internasjonalt anerkjente PECB-sertifiseringskurset får du den nødvendige kunnskapen og ekspertisen til å planlegge og implementere et effektivt styringssystem (I... [+]
Målsetningen med kurset er å gjøre deg i stand til å mestre det du trenger for å implementere sikkerhetskontroller fra de 11 områdene i ISO 27002. Etter kurset skal du kunne: Mestre konseptene, standardene og metoder for å administrere et ISMS på en effektiv måte Kjenne forholdet mellom styringssystem, risikovurdering og compliance i henhold til virksomhetens egne krav Støtte virksomheten i å få implementert og videreutviklet sitt styringssystem Velge ut ressurser i egen virksomhet som utgjør teamet som er ansvarlig for at systemet fungerer til daglig Vise til bedre kunnskaper for analyse og beslutningstagning innenfor informasjonssikkerhet I kurset får du den nødvendige kunnskapen og ekspertisen for å planlegge og implementere et effektivt styringssystem (ISMS) for din virksomhet i henhold til ISO 27001. Kurset er basert på teoretiske presentasjoner etterfulgt av praktiske oppgaver, og går over 5 dager med avsluttende eksamen siste dag. Eksamen varer 3 timer. Hovedemner Planlegging og risikohåndtering Implementering Overvåking Revurdering Drift og vedlikehold Forbedring Revisjon I tillegg til hovedemnene får du full introduksjon til compliance og prosessen for sertifisering. [-]
Les mer
Nettkurs 8 timer 1 175 kr
På forespørsel
Kurset tar for seg de mest sentrale problemstillingene knyttet til sikkerhet rundt bruken av datautstyr som datamaskiner, smarttelefoner og nettbrett.    Kurs... [+]
Kurset tar for seg de mest sentrale problemstillingene knyttet til sikkerhet rundt bruken av datautstyr som datamaskiner, smarttelefoner og nettbrett.    Kurset vil gi brukeren kunnskap om ulike «feller» man kan gå i samt nyttige og praktiske tips og veiledninger til hvordan man unngår at data kommer på avveie eller ødelegges permanent.   Kurset inneholder 50 opplæringsvideoer. Mens andre  kurs fokuserer på å bruke IT-verktøy effektivt, vil dette kurset gi deg innsikt i å bruke IT trygt og sikkert.   Kurset passer for databrukere i alle typer bedrifter og organisasjoner.   Innhold i kurset • Datamaskinen • Passord • Ute av kontoret • Minnepinner • Sikkerhetskopi • E-post • Internett • Ettertest Krav til forkunnskaper Grunnleggende datakunnskaper Kursbevis Etter endt opplæring vil man kunne ta en ettertest for å måle sin nye kunnskap. Ved bestått test så vil man få tilgang til et kursbevis   Nettbasert  Timetall: 6  Kursstart Info: Når som helst - Hele året !  Klokkeslett: 00:00 - 24:00  Påmeldingsfrist:  Pris: kr 1.175,- inkl. mva.  Nettbasert - Web     Kontaktperson: Frode Ingebrigtsen    Status: Åpent for påmelding Gå til påmelding [-]
Les mer
Oslo 5 dager 25 000 kr
30 Aug
30 Aug
25 Oct
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely re... [+]
ISO/IEC 27001 Lead Auditor training enables you to develop the necessary expertise to perform an Information Security Management System (ISMS) audit by applying widely recognized audit principles, procedures and techniques. Course description During this training course, you will acquire the necessary knowledge and skills to plan and carry out internal and external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certification process. Learning objectives Understand the operations of an Information Security Management System based on ISO/IEC 27001 Acknowledge the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks Understand an auditor’s role to: plan, lead and follow-up on a management system audit in accordance with ISO 19011 Learn how to lead an audit and audit team Learn how to interpret the requirements of ISO/IEC 27001 in the context of an ISMS audit Acquire the competencies of an auditor to: plan an audit, lead an audit, draft reports, and follow-up on an audit in compliance with ISO 19011   Course outline Day 1: Introduction to Information Security Management Systems (ISMS) and ISO/IEC 27001 Course objectives and structure Standards and regulatory frameworks Certification process Fundamental principles of Information Security Management Systems Information Security Management Systems (ISMS) Day 2:  Audit principles, preparation and launching of an audit Fundamental audit concepts and principles Evidence based audit approach Initiating the audit Stage 1 audit Preparing the stage 2 audit (on-site audit) Stage 2 audit (Part 1) Day 3:  On-site audit activities Stage 2 audit (Part 2) Communication during the audit Audit procedures Creating audit test plans Drafting audit findings and non-conformity reports Day 4:  Closing the audit Documentation of the audit and the auditquality review Closing the audit Evaluating action plans by the auditor Benefits of the initial audit Managing an internal audit program Competence and evaluation of auditors Day 5:  Certification Exam Preparation for exam Exam   [-]
Les mer
Nettkurs 5 dager 22 900 kr
09 Aug
27 Sep
01 Nov
Live Online Training Velg mellom å ta kurset på hele 5 dager eller 10 halve dager. [+]
The Palo Alto Networks Firewall Configuration and Management (EDU-210) course is an instructor-led training that will help you to: Configure and manage the essential features of Palo Alto Networks Next-Generation FireWallsConfigure and manage Security and NAT policiesConfigure and manage Threat Prevention strategies to block known and unknown threatsMonitor network traffic using the interactive web interface and firewall reports This training is the most important course as it covers all the fundamentals to understand the Next-Generation FireWall from the ground up. Even experienced firewall engineers take a lot out of this course as it includes, besides the architecture and management essentials, topics like Application Identification, Content ID (IPS, Anti-Virus/-Spyware, URL Filtering, File Blocking), SSL Decryption and User Identification which are all features usually not supported by legacy firewalls. In addition to the official content, we also teach security best practices that will enable students to fully leverage the Palo Alto Networks Next-Generation Firewall’s potential as we not only explain the theory but how to use every feature in real life Certification voucherThe Firewall Configuration and Management (EDU-210) course covers all the content required for the PCNSA “Palo Alto Networks Certified Network Security Administrator” certification. The training includes a voucher to do the PCNSA exam free of charge at any Pearson Vue test centre or via Online proctoring. Video recordingIt’s impossible to remember everything in live training, which is why we are recording the online class and share the video with you. If you like to start studying right away, we can share the videos of a previous course and lab access immediately once your booking is confirmed. Lab accessYou will have access to your own dedicated lab which you can use not only during the class but for a full three months without any time or usage limit. Your virtual lab consists of a Client Workstation, a FireWall and an Extranet Server for practical exercises as described in the lab guide. As a bonus, which is not officially part of the course, your lab features the Expedition Migration Tool. Target AudienceSecurity Engineers, Security Administrators, Security Operations Specialists, Security Analysts and Support Staff PrerequisitesNo previous Palo Alto Networks experience is required to take this course while basic familiarity with networking concepts including, routing, switching, and IP addressing is recommended.   Les mer om kurset her   Kurset tilbys også som bedriftsinternt kurs, og arrangeres hos dere eller i våre lokaler, alt etter hva som passer best. Ta kontakt med oss og vi kan finne en god løsning sammen.   [-]
Les mer
Nettkurs 5 dager 15 000 kr
06 Sep
27 Sep
13 Dec
Live Online Training 5 halve dager [+]
 What you learn The Palo Alto Networks Cortex XDR: Prevention, Analysis, and Response (EDU-260) course for advanced endpoint protection and remediation is an instructor-led training that will help you to: Differentiate the architecture and components of the Cortex XDR family Describe Cortex, Cortex Data Lake, the Customer Support Portal, and the hub Activate Cortex XDR, deploy the agents, and work with the management console Work with the Cortex XDR management console, describe a typical management page and work with the tables and filters Create Cortex XDR agent installation packages, endpoint groups, policies, and profiles Create and manage exploit and malware profiles, and perform response actions Differentiate the Cortex XDR rules BIOC and IOC, and create and manage them Describe the Cortex XDR causality analysis and analytics concepts Triage and investigate alerts and incidents, and create alert starring and exclusion policies Work with the Causality and Timeline Views and investigate threats in the Query Center Enable the Host Insights add-on and work with the insights and the Asset View Use Vulnerability Assessment, and work with the Asset Management and the IP View The Cortex XDR course teaches students how the Cortex XDR agent protects against exploits and malware-driven attacks. In hands-on lab exercises, students will explore and configure the Cortex XDR management platform and install Cortex XDR agent as well as relevant components; create security policies and profiles to protect endpoints against multi-stage, fileless attacks built using malware and exploits; respond to attacks using response actions; understand behavioural threat analysis, log stitching, agent-provided enhanced endpoint data, and causality analysis; investigate and triage attacks using the incident management page of Cortex XDR and analyze alerts using the Causality and Timeline analysis views; use API to insert alerts; create BIOC rules, and search a lead in raw data sets in Cortex Data Lake using Cortex XDR Query Builder.   Video Recordings It’s impossible to remember everything in live training, which is why we are recording the online class and share the video with you. If you like to start studying right away, we can share the videos of a previous course and lab access immediately once your booking is confirmed.   Lab access for 3 months You will have access to your own dedicated lab which you can use not only during the class but for a full three months without any time or usage limit. Your virtual lab consists of a dedicated Windows and a Linux Client as well as access to a shared Cortex XDR instance for practical exercises as described in the lab guide.   Certification The Cortex XDR: Prevention, Analysis, and Response (EDU-260) course is not linked to any Palo Alto Networks certification.   Prerequisites Participants must be familiar with enterprise security concepts. [-]
Les mer
Bedriftsintern 1 dag
Hvordan personvernreglene implementeres i ledelsessystemet iht. ISO 9001 og/eller ISO 45001 [+]
EU’s personvernregelverk, som ble innført i 2018, fører fremdeles til en del usikkerhet rundt hva kravene betyr i praksis for kvalitetssystemet.  Hvorfor gå dette kurset? Få oversikten i løpet av én dag Bli trygg på at du har fått med deg det du må om regelverket Unngå kostbare misforståelser Utveksle erfaringer med andre deltakere Etter gjennomført kurs skal du ha kunnskap om: De viktigste kravene i GDPR Hvordan ledelsessystem for kvalitet og arbeidsmiljø tilpasses for å sikre at kravene i GDPR er riktig implementert Risiko i forhold til personopplysninger Revisjon av håndtering av personopplysninger   [-]
Les mer