EC-Council Certified Network Defender | CND (via e-learning)

De training van CLS Computertrainingen is niet beschikbaar meer op Springest. Bekijk hieronder enkele alternatieven:

check_box_outline_blank

Architecting on AWS

Logo van Xebia Academy
|META_INFO|

Become a Certified AWS Solutions Architect This training prepares you for the AWS Certified Solutions Architect – Associate exam. This exam…

check_box_outline_blank

5G Core Network in an Hour

Logo van Apis Training AB
|META_INFO|

CONTENTS This course provides a condensed overview of the 5G Core Network as defined in the R17 3GPP standards. It is intended to give a qu…

check_box_outline_blank

Certified Penetration Testing Consultant (CPTC)

Logo van Startel bv
|META_INFO|

Algemene omschrijving The vendor-neutral Certified Penetration Testing Consultant course is designed for IT Security Professionals and IT N…

check_box_outline_blank

Troubleshooting and Maintaining Cisco IP Networks

Logo van @The Academy
|META_INFO|

Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Troubleshooting and Maintaining Cisco IP Networks (TSHOOT 642-832) is a qualifyi…

check_box_outline_blank

5G Core Network in a Day

Logo van Apis Training AB
|META_INFO|

CONTENTS This course presents the 5G Core Network Architecture as defined in the R17 3GPP standards. It quickly introduces the new network …

check_box_outline_blank

Certified Network Defender (CND v2) Classroom + examen

Logo van Startel bv
|META_INFO|

Algemene omschrijving Wanneer Security uw focus is dan biedt Certified Network Defender CND v2 een allesomvattende aanpak om effectief om t…

check_box_outline_blank

Certified Application Security Engineer JAVA (CASE JAVA)

Logo van Startel bv
|META_INFO|

Algemene omschrijving The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and …

check_box_outline_blank

Online CISA Preparation Course / English - Virtual

Logo van Security Academy
|META_INFO|

Intensive CISA® training with ISACA-accredited trainers Develop a risk-based information systems audit strategy; Plan and conduct informati…

check_box_outline_blank

SC-200: Microsoft Security Operations Analyst

Logo van ExplainiT
|META_INFO|

In the course SC-200: Microsoft Security Operations Analyst you will learn how to mitigate cyberthreats using technologies as Microsoft Sen…

check_box_outline_blank

Certified Chief Information Security Officer (CCISO)

Logo van Behaviour Group
|META_INFO|

----- Guaranteed Date ----- CCISO Program is a training and certification program aimed at producing top-level information security executi…