Global Knowledge Network Netherlands B.V.: 1578 producten
AWS Security Essentials [GK3337]
OVERVIEW AWS Security Essentials covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and…
Understanding Cisco Wireless Foundations [WLFNDU]
OVERVIEW The Understanding Cisco Wireless Foundations (WLFNDU) course provides the knowledge and skills needed to configure, manage, and tr…
Performing CyberOps Using Cisco Security Technologies [CBRCOR-CPLL]
OVERVIEW The Performing CyberOps Using Cisco Security Technologies (CBRCOR) course guides you through cybersecurity operations fundamentals…
Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps [CBRFIR-CPLL]
OVERVIEW The Conducting Forensic Analysis and Incident Response Using Cisco Technologies for CyberOps (CBRFIR) course helps build your Digi…
IBM App Connect Enterprise 12 Application Development II [ZM687G]
OVERVIEW This course provides instruction in using IBM App Connect Enterprise to connect to IBM MQ and reference databases. The first part …
Mobile Forensics Deep Dive Workshop [EC-MFDD]
OVERVIEW Smart phones are ubiquitous, and for that reason, it is hard to imagine any investigation that cannot be enhanced with investigati…
CISM Online Review Course [CISM-EL]
OVERVIEW Prepare to obtain the Certified Information Security Manager® (CISM) certification and be recognized among the world’s most-qualif…
ITIL® 4 Practitioner: Information Security Management E-Learning with Exam [E-ITIL4P-CAI-ISM-GEL]
OVERVIEW The ITIL 4 Practitioner: Information Security Management course focuses on providing an understanding of the key concepts, princip…
ITIL® 4 Practitioner: Service Request Management E-Learning with Exam [E-ITIL4P-MSF-SRM-GEL]
OVERVIEW The ITIL 4 Practitioner: Service Request Management Practice course is for IT professionals who want to support the agreed quality…
ISO/IEC 27001:2022 Information Security: Lead Implementer (PECB certified) - Inclusief Examen [ISO27001LI]
OVERVIEW This ISO/IEC 27001 Lead Implementer training enables you to develop the necessary expertise to support an organization in establis…
Securing Kubernetes Clusters with Red Hat Advanced Cluster Security (DO430) [DO430]
OVERVIEW Address security challenges by applying Red Hat Advanced Cluster Security for Kubernetes in an OpenShift cluster environment. Cust…
ITIL® 4 Practitioner: Change Enablement E-Learning with Exam [E-ITIL4P-PIC-CE-GEL]
OVERVIEW The ITIL 4 Practitioner: Change Enablement course provides best practice guidance on how to maximize the number of successful serv…
Microsoft Security Operations Analyst (SC-200) [M-SC200]
OVERVIEW Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defen…
Citrix NetScaler ADC 14.x Advanced Features (Security and Management) [NS-301]
OVERVIEW Designed for experienced IT professionals, this course is best suited for individuals who will be deploying and/or managing Applic…
Security Engineering on AWS [GK3338]
OVERVIEW Security is a concern for both customers in the cloud, and those considering cloud adoption. An increase in cyberattacks and data …
