網絡空間安全(Cyber Security)培訓

網絡空間安全(Cyber Security)培訓

本地,有教師指導的現場網絡安全(也稱為網絡安全,互聯網安全或信息技術安全)培訓課程通過互動式討論和實踐練習,展示如何在其組織內理解,規劃和實施網絡安全策略。特別著重於建立檢測和減輕威脅所需的適當系統和程序。 Internet Security課程可作為交互式培訓提供,其中一些課程包括測試和認證組件。網絡安全培訓可作為“現場實況培訓”或“遠程實時培訓”。現場實地培訓可在當地客戶現場進行台灣或者在NobleProg公司的培訓中心台灣 。遠程實時培訓通過交互式遠程桌面進行。 NobleProg您當地的培訓提供商。

Machine Translated

客戶評論

★★★★★
★★★★★

Cybersecurity課程大綱

課程名稱
課程時長
概觀
課程名稱
課程時長
概觀
14小時
This instructor-led, live training in 台灣 (online or onsite) is aimed at security managers who wish to learn basic to intermediate-level CCTV security surveillance and management skills. By the end of this training, participants will be able to:
  • Familiarize the types of CCTV systems and know their benefits and features.
  • Understand cabling and CCTV systems setup requirements.
  • Install, configure, and manage CCTV systems.
14小時
This instructor-led, live training in 台灣 (online or onsite) is aimed at security professionals who wish to learn and improve how to handle security threats and perform security risk assessments. By the end of this training, participants will be able to:
  • Manage security systems and handle any hostile environment.
  • Manage any security risks or threats.
  • Learn how to conduct security risk assessments.
14小時
This instructor-led, live training in 台灣 (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks. By the end of this training, participants will be able to:
  • Configure Cloudflare for their websites.
  • Set up DNS records and SSL certificates.
  • Implement Cloudflare for content delivery and caching.
  • Protect their websites from DDoS attacks.
  • Implement firewall rules to restrict traffic to their websites.
14小時
This instructor-led, live training in 台灣 (online or onsite) is aimed at service technicians, system admins, or anyone who wishes to learn proper installation, usage, and management of the Honeywell security system. By the end of this training, participants will be able to:
  • Learn the concepts of the Honeywell security systems and components.
  • Properly install and maintain a Honeywell security system.
  • Utilize the Honeywell maintenance tools and management suite to control a security system.
7小時
Cyber Security is the practice of applying technologies, controls, and processes to protect computer systems, servers, networks, devices, programs, and data from malicious cyber attacks. This instructor-led, live training (online or onsite) is aimed at anyone who wish to learn how to protect internet-connected systems from different kinds of cyber threats. By the end of this training, participants will be able to:
  • Understand the concept of Cyber Security.
  • Learn and understand the different Cyber Security threats.
  • Learn processes and best practices to protect internet-connected systems from cyber attacks.
Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange.
7小時
This instructor-led, live training in 台灣 (online or onsite) is aimed at developers and anyone who wishes to learn and use OAuth to provide applications with secure delegated access. By the end of this training, participants will be able to:
  • Learn the fundamentals of OAuth.
  • Understand the native applications and their unique security issues when using OAuth.
  • Learn and understand the common extensions to the OAuth protocols.
  • Integrate with any OAuth authorization server.
14小時
This instructor-led, live training in 台灣 (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code. By the end of this training, participants will be able to:
  • Understand the features and structure of Snyk.
  • Use Snyk to find and fix code security issues.
  • Integrate Snyk in a software development lifecycle.
14小時
The course is providing practical knowledge on OpenStack and private cloud security. It starts from the introduction to the system, then the participants are getting practical knowledge on security in private clouds and securing OpenStack installation. During the course, each of the core OpenStack modules is presented, participants are building up virtual identity, image, network, compute and storage resources while discussing relevant security topics. Each participant is getting their own training environment with a complete OpenStack installation based on selected cloud architecture (eg. storage, networking). The training could be highly customized based on the needs of the client. Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments
 
28小時
This instructor-led, live training in 台灣 (online or onsite) is aimed at developers, engineers, and architects seeking to secure their web apps and services. By the end of this training, participants will be able to integrate, test, protect, and analyze their web apps and services using the OWASP testing framework and tools.
35小時
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. The purpose of the Ethical Hacking Training is to:
  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.
Audience: The Course is ideal for those working in positions such as, but not limited to:
  • Security Engineers
  • Security Consultants
  • Security Managers
  • IT Director/Managers
  • Security Auditors
  • IT Systems Administrators
  • IT Network Administrators
  • Network Architects
  • Developers
7小時
In this instructor-led, live training 台灣 (online or onsite), we discuss CAS's architecture and features and practice installing and configuring a CAS server. By the end of this training, participants will be able to:
  • Have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication).
  • Have the necessary practice to deploy and manage their own authentication server.
7小時
Shadowsocks是一個開源的,安全的socks5代理。 在這個有指導的現場培訓中,參與者將學習如何通過Shadowsocks代理獲得互聯網連接。 在培訓結束後,參與者將能夠: 在任何支持的平台上安裝和配置Shadowsocks,包括Windows,Linux,Mac,Android,iOS和OpenWRT。 使用包管理器系統(例如pip,aur,freshports等)部署Shadosocks。 在移動設備和無線網絡上運行Shadowsocks。 了解Shadowsocks如何加密消息並確保完整性和真實性。 優化Shadowsocks服務器 聽衆 網絡工程師系統管理員計算機技術人員 課程的格式 部分講座,部分討論,練習和沈重的練習
7小時
NetNORAD是一個由Facebook構建的系統,用於通過端到端探測解決網絡問題,與設備輪詢無關。 在這個由講師指導的實時培訓中,參與者將了解NetNORAD和主動路徑測試如何幫助他們改進網絡故障排除方法。 在培訓結束時,參與者將能夠:
  • 了解NetNORAD的工作原理
  • 了解NetNORAD背後的設計原則
  • 使用開源NetNORAD工具和自己的代碼來實現故障檢測系統
聽眾
  • 網絡工程師
  • 開發商
  • 系統工程師
課程形式
  • 部分講座,部分討論,練習和繁重的實踐練習
14小時
物聯網(IoT)是一種無線連接物理對象和軟件應用程序的網絡基礎設施,允許它們相互通信並通過網絡通信,雲計算和數據捕獲交換數據。安全性是物聯網解決方案部署的主要障礙之一。由于物聯網技術涉及廣泛的設備,因此設計物聯網安全性對于成功部署物聯網至關重要。 在這種有指導性的現場培訓中,參與者將了解物聯網架構並了解適用于其組織的不同IoT安全解決方案。 在培訓結束後,參與者將能夠: 了解物聯網架構了解新興的物聯網安全威脅和解決方案在組織中實施物聯網安全技術 聽衆 IT專業人員開發商工程師經理 課程的格式 部分講座,部分討論,練習和沈重的練習 注意 要請求本課程的定制培訓,請聯系我們安排
7小時
本課程介紹了安全性和IT安全性的基本概念,重點是防範網絡攻擊。參與者將了解Web服務的基本安全協議和安全概念。最近針對密碼系統的攻擊和一些最近的相關漏洞將被引用
14小時
BeyondCorp是一個開源零信任安全框架,允許員工從任何位置安全地工作,而無需傳統的VPN。 在這個以講師為主導的現場培訓中,參與者將學習如何在實時實驗室環境中設置和部署BeyondCorop時設置零安全系統。 在培訓結束時,參與者將能夠:
  • 評估其組織的現有安全模型。
  • 將訪問控制從周邊轉移到單個設備和用戶。
  • 使用用戶和以設備為中心的身份驗證和授權工作流來部署應用程序。
  • 在其組織內了解,規劃和實施零信任網絡。
聽眾
  • 網絡工程師
  • 網絡安全專業人士
  • 系統架構師
  • IT經理
課程格式
  • 部分講座,部分討論,練習和繁重的實踐練習
注意
  • 要申請本課程的定制培訓,請聯繫我們安排。
14小時
This course is designed to help the attendee to build organizational resilience against a range of threats so that organizations can respond effectively to incidents, maintain the availability of business operations and safeguard its interests. 
7小時
本課程討論如何管理事件響應團隊,第一響應者如何行動,考慮到當今網絡攻擊的頻率和復雜性,事件響應是組織的關鍵功能。事件響應是最後一道防線,檢測並有效響應事件需要強大的管理流程,管理事件響應團隊需要特殊的技能和知識
21小時
This instructor-led, live training in 台灣 (online or onsite) is aimed at engineers who wish to safeguard connected vehicles from cyber attacks. By the end of this training, participants will be able to:
  • Implement cybersecurity in automotive systems.
  • Choose the most suitable technologies, tools, and approaches.
14小時
Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange
7小時
  • 在為期一天的研討會之後,與會者將能夠展示對Cloud Computing知識和理解。
14小時
RESILIA課程從目的,關鍵術語,彈性和安全性之間的區別以及實施網絡彈性的好處開始。它介紹了風險管理以及解決風險和機遇所需的關鍵活動。此外,它解釋了共同管理標準和最佳實踐框架與實現網絡彈性的相關性。隨後,它確定了應與相應的ITSM活動保持一致的網絡彈性過程,相關的控制目標,交互和活動。在課程的最後部分,它描述了與網絡彈性角色和職責相關的職責分離和雙重控制。
35小時
This course explore the technical skills to implement, monitor and administer IT infrastructure using information security policies and procedures. And how to protecting the confidentiality, integrity and availability of data.    
 
7小時
本課程為領導者和管理者提供與網絡安全相關的問題和活動的概述。 領導者將獲得各種主題的信息,這些信息將構建他們的知識並磨練有關網絡安全威脅的執行決策。
7小時
本課程涵蓋了PKI的基礎知識,加密的基礎知識,Windows 7和Windows 8當前使用的加密文件系統,使用各種軟件創建PKI以及查看可以利用PKI實現中的漏洞的工具。
7小時
本課程涵蓋了體系結構中安全性和隱私性的考慮,以及如何在設計階段的設計階段設計安全性,該課程還涵蓋了在體系結構中設計的許多技術控制。
14小時
這兩天課程專為那些負有一些數據保護責任的人而設計
組織或由於其他原因希望實現和展示廣泛的組織
了解法律,包括歐盟通用Data Protection條例( GDPR )和
英國Data Protection法案及其實際應用。人們認識到那些
組織內部數據保護的總體責任需要詳細制定
對法律的理解“
14小時
支付卡行業專業培訓課程提供個人資格
對於希望展示其專業知識和技能的行業從業者而言
了解PCI數據安全標準(PCI DSS)。

Last Updated:

網絡空間安全(Cyber Security),培訓,課程,培訓課程, 企業網絡空間安全(Cyber Security)培訓, 短期Cybersecurity培訓, Cybersecurity課程, Cybersecurity周末培訓, 網絡空間安全(Cyber Security)晚上培訓, 網絡空間安全(Cyber Security)訓練, 學習網絡空間安全(Cyber Security), Cybersecurity老師, 學Cybersecurity班, 網絡空間安全(Cyber Security)遠程教育, 一對一Cybersecurity課程, 小組Cybersecurity課程, Cybersecurity培訓師, 網絡空間安全(Cyber Security)輔導班, Cybersecurity教程, 網絡空間安全(Cyber Security)私教, 網絡空間安全(Cyber Security)輔導, 網絡空間安全(Cyber Security)講師

促銷課程

No course discounts for now.

訂閱促銷課程

為尊重您的隱私,我公司不會把您的郵箱地址提供給任何人。您可以享有優先權和隨時取消訂閱的權利。

我們的客戶

is growing fast!

We are looking to expand our presence in Taiwan!

As a Business Development Manager you will:

  • expand business in Taiwan
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!

This site in other countries/regions