IT Security Courses a Hacking

GOC601 | Duration 3 days | 9 terms
Times have changed. Both we and our children live in a digital world where it is now necessary to have basic knowledge of information security and not only to be able to search for information but especially to be able to verify it. [...]
BPZ-A | Duration 2 days | 2 terms
Two days base training for employees and other IT users who need to understand basic requirements and their own responsibilities in regard to corporate information security and privacy protection.
One day recapitulation training for employees and other IT staff who work with sensitive and protected data and personal information in an environment which implements InfoSec, ISMS or GDPR. The training is meant as a regular recap [...]
The one-day course introduces participants to how to raise employee awareness of risks and the proper use of AI tools, and show safe alternatives. We do not want to ban AI, but to learn how to use it in a way that does not threaten [...]
CSCU | Duration 2 days | 2 terms
CSCU - Certified Secure Computer User is a course focused on regular users of information technologies. The participants will learn how to handle their data, personal computer, notebook or wireless network securely. The main topic of [...]
GOC51 | Duration 2 days | 3 terms
Do you want to keep all your personal data private and confidential make sure your confidential communication stays confidential? Do you want to prevent data leaking in case of loss or theft of your computers or storage media?Are you [...]
The three-day course is intended for administrators and architects of IT infrastructure built on Active Directory and Azure Active Directory, who want to learn how user accounts security works, how to properly handle privileged [...]
GOC161 | Duration 3 days | 6 terms
Three-days course for students who want to get into the current cryptography technologies in as practical way as possible
Five-days course introduces students into the problems of ISMS security auditing according to ISO/IEC 27001 and ISO/IEC 27002 of Windows infrastructure based on various operating systems such as Windows Server 2019/2016/2012, Windows [...]
This four-days instructor led course teaches principal details and how to implement, monitor and troubleshoot Windows authentication methods such as Kerberos, LM, NTLM, PKINIT, Schannel, Basic or simple bind. The training covers the [...]
GOC173 | Duration 5 days | 6 terms
This instructor led course provides students with advanced teoretical knowledge and practical experience in designing, deploying, operating and troubleshooting PKI on Windows platform. The first part of the taining provides [...]
This 5-day advanced course will teach you the implementation of security networks which are set on Windows and Active Directory. The course contains particular security topics from other Windows Server 2012 courses. And by this way [...]
Five-days instructor-led training which will teach you the methods used both for attacks and penetration testing against Active Directory. You will be able to practice all the attacks using the tools such as Kali Linux or Commando VM
GOC215 | Duration 5 days | 9 terms
Five-days instructor-led course presents topics on security strategies and practical demonstrations on Microsoft 365 protection of user accounts and sensitive data, expansion of secuirty of local ADs, advanced threat detections and [...]
GOC217 | Duration 2 days | 8 terms
Two-days instructor-led traning teaches detailed functionality of HTTP, HTTPS and proxy servers and their farms, overview of TLS (SSL) protocols and especially certificate requirements, briefly basics of HTML and JavaScript, but in [...]
GOC238 | Duration 5 days | 5 terms
Five-days instructore-led hands-on training starts with the perspecitive of an ethical hacker, proceeds with a view of a penterster and concludes with observing practices performed by black-hat hackers.
A five-day advanced course designed for IT and SOC specialists responsible for security event detection and threat analysis in cloud and hybrid environments, as well as on user endpoints. It focuses on using tools in the Microsoft [...]
GOC241 | Duration 2 days | 4 terms
Two-days course introduces terminology and principles in identifying and evaluating assets, vulnerabilities and threats on information security and the resulting risks on business continuity of corporations as well as government [...]
The five-day course supports preparation for the Certified Information Systems Security Professional (CISSP, ISC2) exam and introduces attendees to all eight critical domains and the necessary IT security terminology to understand [...]
CHFI | Duration 5 days | 6 terms
The CHFI Certified Hacking Forensic Investigator is a unique training where students can learn with the newest techniques and tools in the discipline of computer forensics from a vendor-neutral perspective. The C|HFI certification [...]
CNDv2 | Duration 5 days | 10 terms
CND je pokročilý bezpečnostní kurz s velkým množstvím praktických ukázek a cvičení, kde si účastníci formou praktického nasazení seznámí se všemi základními komponentami obrany IT prostředí nezbytných pro efektivní obranu IT [...]
CTSEC | Duration 5 days | 16 terms
This unique five-day course serves as essential preparation for the globally recognized CompTIA Security+ SY0-701 certification exam, which has become the industry standard for IT security certification. Participants will gain a [...]
CTCA | Duration 5 days | 2 terms
This five-day course is intended for administrators, especially network administrators and security administrators who are responsible for security or are interested in seeing beneath the surface through the eyes of a security [...]
CTSRV | Duration 5 days | 6 terms
The main aim of this course is to help to prepare you for CompTIA's Server+ Certification exam. Server+ Certification is internationally recognised by many corporations. Indeed, CompTIA Server+ Certification is a prerequisite [...]
QACISM | Duration 4 days | 13 terms
This Official ISACA Certified Information Security Manager (CISM) training course focuses on the construction, development, and governance of information security operations. Possession of this certification displays precise [...]
QACISA | Duration 4 days | 4 terms
Certified Information Systems Auditor (CISA) is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information [...]
QACRISC | Duration 4 days | 8 terms
CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and enterprise risk management, and positions them to become strategic partners to the enterprise QA is proud to be an [...]
QACCSP | Duration 5 days | 4 terms
(ISC)2 developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, [...]
CyberSAFE | Duration 1 day | No scheduled terms
Welcome to CyberSAFE: Exam CBS-410. Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course [...]
This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber [...]
CFR | Duration 5 days | 2 terms
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber [...]
CTPEN | Duration 5 days | 9 terms
Nejnovější verze 5denního kurzu CompTIA PenTest+ je součástí přípravy na celosvětově uznávanou certifikační zkoušku CompTIA PenTest+ (PT0-003), která je nyní standardem v kybernetické bezpečnosti. Například certifikát PenTest+ je [...]
CRE_BLAST | Duration 1 day | No scheduled terms
Security awareness training. CybeReady provides an end-to-end solution covering all your Cyber Security Training needs with almost zero IT effort. Built by cybersecurity learning experts, CybeReady combines data science with advanced [...]
CRE_CAB | Duration 1 day | No scheduled terms
Security awareness training. CybeReady provides an end-to-end solution covering all your Cyber Security Training needs with almost zero IT effort. Built by cybersecurity learning experts, CybeReady combines data science with advanced [...]
CRE_AR | Duration 1 day | No scheduled terms
Security awareness training. CybeReady provides an end-to-end solution covering all your Cyber Security Training needs with almost zero IT effort. Built by cybersecurity learning experts, CybeReady combines data science with advanced [...]
GLAB007 | Duration 2 days | 6 terms
The two days interactive lab leads the students using lateral movement through a Windows enterprise environment in order to gain Domain Admins credentials.
GLAB008 | Duration 2 days | 6 terms
The two days second incarnation of interactive lab leading the students using lateral movement through a Windows enterprise environment in order to gain Domain Admins credentials.
AIEH | Duration 5 days | 3 terms
Designed specifically for those who want to build real-world, tactical skills, this 5-day intensive, lab-driven course blends ethical hacking, AI, and machine learning into a powerful skills-building experience. No theory-heavy [...]
AIDEH | Duration 5 days | 1 term
This 5-day intensive course is designed to equip you with essential skills in building, hacking, and defending drones and autonomous vehicles. You’ll learn to navigate the latest drone technologies, identify vulnerabilities, and [...]
AIIOTEH | Duration 5 days | 3 terms
This innovative, hands-on 5-day course provides a comprehensive foundation in the integration of AI with Internet of Things (IoT) technologies. Participants will gain practical experience across a range of domains - including smart [...]
WAIAZIR | Duration 3 days | No scheduled terms
The AI Azure Cloud Incident Response Skill Building workshop is designed to help you build on job skills for responding to various incidents. This outline ensures a comprehensive and hands-on approach to mastering Azure incident [...]
GOC3 | Duration 5 days | 14 terms
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform. At least half [...]
GOC32 | Duration 5 days | 11 terms
V tomto jedinečném a velmi detailním hacking kurzu přinášíme přehled útoků, které jsou pro většinu podnikových sítí nejrizikovější. Kurz vhodně rozšiřuje dlouhodobě nejoblíběnější části školení CEH a do větších detailů probírá část [...]
GOC33 | Duration 5 days | 8 terms
V pokročilém kurzu hackingu se zabýváme pokročilými síťovými útoky pro detailní průzkum síťového prostředí. Naučíme se zneužívat slabiny v chybné implementaci zabezpečení ethernet i WiFi sítí. Vyzkoušíme si prostup ochranou sítě na [...]
GOC3314 | Duration 3 days | 6 terms
The course looks into security of web applications from the different points of view and it is designed for programmers and administrators of web servers on Microsoft IIS platform, where ASP.NET application is running. The [...]
GOC541 | Duration 5 days | 8 terms
This course will introduce you to the secrets of webhacking and web application vulnerabilities that make end-users attacks possible. The course will allow you to fully understand the methods that are commonly used by attackers and [...]
GOC542 | Duration 5 days | 7 terms
This course will introduce you to the secrets of webhacking and web application vulnerabilities, which make it possible to attack application servers and to steal data stored on them. The course will allow you to fully understand the [...]
GOC55 | Duration 5 days | 5 terms
Do you develop any web app applications and consider the integration of security testing into their lifecycle? Then this course is design right for you. You will learn when and how to test the web application effectively. You will [...]
CEHv13 | Duration 5 days | 14 terms
Certified Ethical Hacker (CEH) v13 je nejnovější verzí prestižního kurzu EC-Council pro etické hackery, která přináší zásadní inovace v oblasti kybernetické bezpečnosti. Kurz nyní zahrnuje rozšířené praktické dovednosti a integruje [...]
CHFI | Duration 5 days | 6 terms
The CHFI Certified Hacking Forensic Investigator is a unique training where students can learn with the newest techniques and tools in the discipline of computer forensics from a vendor-neutral perspective. The C|HFI certification [...]
CPENT | Duration 5 days | 5 terms
CPENT je nejpokročilejší kurz etického hackingu vhodný pro všechny budoucí penetrační testery, bezpečnostní specialisty a pro každého, kde chce mít jistotu, že zvládá techniky etického hackingu prakticky a chce si své zkušenosti [...]
C_CSE | Duration 5 days | 2 terms
EC-Council’s Certified Cloud Security Engineer (C|CSE) course is curated by cloud security professionals in association with renowned subject matter experts to deliver a mix of vendor-neutral and vendor-specific cloud security [...]
GOC60 | Duration 5 days | 12 terms
Today, there are immense opportunities to obtain quality information from public sources. The art of obtaining this information, subsequent analysis and evaluation can bring people and companies knowledge and insights for effective [...]
Five-days instructor-led training which will teach you the methods used both for attacks and penetration testing against Active Directory. You will be able to practice all the attacks using the tools such as Kali Linux or Commando VM
GOC238 | Duration 5 days | 5 terms
Five-days instructore-led hands-on training starts with the perspecitive of an ethical hacker, proceeds with a view of a penterster and concludes with observing practices performed by black-hat hackers.
AI_DIGITALSEC | Duration 1 day | 10 terms
This course is aimed at providing practical knowledge and skills in protecting against digital manipulations such as deepfake and fake news. You will learn not only how to identify manipulations, but also how to implement measures to [...]
GOC161 | Duration 3 days | 6 terms
Three-days course for students who want to get into the current cryptography technologies in as practical way as possible
This four-days instructor led course teaches principal details and how to implement, monitor and troubleshoot Windows authentication methods such as Kerberos, LM, NTLM, PKINIT, Schannel, Basic or simple bind. The training covers the [...]
GOC173 | Duration 5 days | 6 terms
This instructor led course provides students with advanced teoretical knowledge and practical experience in designing, deploying, operating and troubleshooting PKI on Windows platform. The first part of the taining provides [...]
The one-day course introduces participants to how to raise employee awareness of risks and the proper use of AI tools, and show safe alternatives. We do not want to ban AI, but to learn how to use it in a way that does not threaten [...]
The two days training is intended for CISO and InfoSec managers as well as for any IT professional who is responsible for implementing current legislature regarding data privacy and kybernetic security in general.
The three-day course is intended for administrators and architects of IT infrastructure built on Active Directory and Azure Active Directory, who want to learn how user accounts security works, how to properly handle privileged [...]
Five-days course introduces students into the problems of ISMS security auditing according to ISO/IEC 27001 and ISO/IEC 27002 of Windows infrastructure based on various operating systems such as Windows Server 2019/2016/2012, Windows [...]
GOC226 | Duration 1 day | 3 terms
One-day training targeted to managers will guide you not only through the ISO 27001 (revision 2022) but also with its relation to requirements on privacy and its integration with ISO 9001. The training will give you guidance how to [...]
GOC240 | Duration 2 days | 5 terms
Two-days instructor-led training introduces the technical and administrative requirements of the european directive NIS2
GOC241 | Duration 2 days | 4 terms
Two-days course introduces terminology and principles in identifying and evaluating assets, vulnerabilities and threats on information security and the resulting risks on business continuity of corporations as well as government [...]
DPO | Duration 2 days | No scheduled terms
Od května 2018 bude v podstatě každá státní i soukromá organizace podléhat evropskému nařízení GDPR. Splnění jeho požadavku závisí na účinné spolupráci managementu s IT i podnikovými právníky. Bez účinného řízení není možné [...]
ISO20000 | Duration 2 days | 6 terms
ISO (International Organization for Standardization) na sebe převzalo úlohu přenášet nejlepší praktiky mnoha společnostmi a časem ověřenými způsoby řízení z různých oblastí do praxe. Zní to složitě? Pravdou je, že bez ISO bychom [...]
ISO9001 | Duration 2 days | 5 terms
ISO (International Organization for Standardization) na sebe převzalo úlohu přenášet nejlepší praktiky a časem ověřené způsoby řízení z různých oblastí do praxe. Zní to složitě? Pravdou je, že bez ISO norem bychom například nebyli [...]
ISO31000 | Duration 2 days | 4 terms
ISO (International Organization for Standardization) na sebe převzalo úlohu přenášet nejlepší praktiky a časem ověřené způsoby řízení z různých oblastí do praxe. Zní to složitě? Pravdou je, že bez ISO norem bychom například nebyli [...]
MPL1 | Duration 2 days | 2 terms
A basic two-day course in which you will get to know in detail the licensing conditions of Microsoft products, whether it is desktop operating systems, applications, server products, but also online services, including licensing of [...]
In the one-day advanced course, you will get to know in detail the specifics of Microsoft's license terms, intended primarily for Microsoft partners and for those who actively trade Microsoft software. We will deal in detail with [...]
SAM3 | Duration 1 day | No scheduled terms
Kurz je určen pro SAM manažery a auditory, kteří se chtějí naučit využívat veškeré dostupné funkce řešení AuditPro a administrátorům počítačových sítí, kteří se ho chystají implementovat a spravovat.
CPWSDP | Duration 1 day | No scheduled terms
Školení je určeno pro všechny, kteří se potýkají s výkonnostními problémy. Navazuje a rozšiřuje hlavní kapitoly o výkonnosti ze školení CCSE, a to SecureXL a CoreXL. Pomůže vám identifikovat problémy v jejich počátku a doporučí vám [...]
CCAS | Duration 2 days | No scheduled terms
This course provides an understanding of the advanced concepts and skills necessary to automate and orchestrate tasks relating to managing Check Point Security Policies.
Gain advanced skills for effectively securing and managing a multi-domain enterprise security network. Apply understanding of open-source and Check Point troubleshooting tools and techniques to investigate and resolve complex issues.
CCESR | Duration 2 days | No scheduled terms
This two-day course for specialists provides a comprehensive knowledge of the Check Point Endpoint Security solution and its deployment in a corporate network environment. Learn the fundamental concepts and develop the skills [...]
This course provides students with the fundamental knowledge, skills, and hands-on experience necessary to configure, manage, and monitor an existing Quantum Security environment.
CCSER | Duration 3 days | 3 terms
This advanced course is taught for security experts and other technical professionals with previous training or experience with the Check Point platform on the Gaia operating system.
The 2-day Check Point Certified Troubleshooting Administrator (CCTA) provides an understanding of the concepts and skills necessary to troubleshoot issues that may occur when managing the Check Point Security Management architecture [...]
CCTE | Duration 2 days | 1 term
This 2-day course is designed to provide advanced troubleshooting skills to investigate and resolve more complex issues that may occur while managing your Check Point Security environment.
CCVS | Duration 2 days | No scheduled terms
The Check Point Certified VSX Specialist course is intended to provide you with the theoretical knowledge and practical skills needed to deploy, manage, and troubleshoot the Check Point VSX environment.
CCME | Duration 2 days | 1 term
This course is designed for administrators and Check Point resellers that offer Hyperscale Network Security as business and technical equirements change to accommodate massive network traffic growth. This course equips IT [...]
IBMSOAR1 | Duration 3 days | 2 terms
This Tech Data exclusive training focuses on fundamental knowledge of IBM SOAR (Resilient). The training includes presentation from the trainer as well as excercises in lab environment for better experience in practice.
IBMSOAR2 | Duration 2 days | 2 terms
This Tech Data exclusive training focuses on advanced lab module excercises of IBM SOAR (Resilient). The training includes presentation from the trainer as well as excercises in lab environment for better experience in practice.
IBMSIEM | Duration 1 day | 2 terms
The course provides an overview of the Cybersecurity Act, its key concepts, and practical application. Participants will learn how to implement legal requirements, identify, and address cybersecurity threats. They will also gain [...]

Top courses

GOC272

Duration 2 days

GOC26

Duration 2 days

PRINCE2F7

Duration 3 days

MSEXNL

Duration 3 days

ITIL4FPT

Duration 3 days

JSPRINGBOOT1

Duration 5 days

LXI3

Duration 3 days

GOC60

Duration 5 days

CTSEC

Duration 5 days

MOC AZ-104

Duration 4 days