Lead Cloud Security Manager.

Learn about cloud security management - effectively protect data, applications and infrastructure from cyber threats.

Learn about cloud security management - effectively protect data, applications and infrastructure from cyber threats.

Gain the knowledge and tools to manage application security - from analyzing risks to implementing effective safeguards.

Gain the skills to manage sustainable procurement according to ISO 20400 - from strategy to practical implementation in the organization.

Learn about the technical requirements of NIS2 and KSC - find out how to effectively implement cyber security measures in compliance with the new regulations.

Training description Szkolenie koncentruje się na projektowaniu, wdrażaniu i zarządzaniu bezpieczną infrastrukturą w środowisku Google Cloud Platform. Program obejmuje praktyczne aspekty implementacji mechanizmów bezpieczeństwa, zarządzania tożsamością oraz zapewnienia zgodności z obowiązującymi regulacjami. Zajęcia prowadzone są…

Training in advanced cryptographic techniques teaches the design and implementation of security mechanisms, combining theory and practice in the context of modern IT systems.

Training in reverse engineering and code security techniques teaches binary analysis, debugging and protecting code from analysis and attacks.

PKI implementation and management training will teach participants about implementation, certificate lifecycle management, and PKI integration with systems.

Training in innovative blockchain applications in business combines theory with practice, teaching the design and implementation of blockchain solutions in various sectors.

Training in advanced applications of SSL/TLS protocols teaches how to configure, optimize and secure communications, combining theory with practical workshops.

Learn about key roles and processes in cyber security and securing operational systems. EITT training covers ITIL principles, access control and authentication methods.

Learn about securing IMS systems using Resource Access Control Facility (RACF). Learn how to implement security, manage resource access, and monitor IMS security.

Learn the implementation of RACF security for CICS/ESA and CICS/TS. Learn to define resources, control user access, and manage transactions and application resources.

Security Operations on AWS course - learn how to secure your cloud infrastructure on the AWS platform to effectively protect your data and applications from threats.

IBM Security QRadar SIEM Advanced Topics course - learn advanced techniques for managing and configuring IBM QRadar SIEM to even more effectively detect and respond to security threats.

IBM Security QRadar SIEM Administration course - learn how to manage and optimize IBM QRadar SIEM to effectively monitor and respond to security threats in your IT infrastructure.

Security Intelligence Fundamentals course - learn the basic principles and tools used in security intelligence to effectively protect your organization from threats.

The z/OS Security Server RACF Training: Implementing and Customization covers creating and managing the RACF database, customizing profiles and features, program control, and multi-layer security.

Master the implementation of DirMaint and RACF Security Server for z/VM. Learn how to manage virtual machines and secure z/VM systems with hands-on exercises.

Master advanced RACF features to effectively manage the security of z/OS systems, including remote administration and UNIX support.

Master effective security management with RACF to enhance the protection of z/OS systems through advanced administration techniques.

Learn the basics of security management with z/OS RACF. Training includes user and group creation, resource protection, data management, and basic RACF commands.

Gain practical knowledge of computer network security to effectively protect your organization's IT infrastructure.

Learn how to secure embedded systems from cyber threats and strengthen the security of your company's embedded devices.

Learn advanced cybersecurity strategies from EITT, including managing and neutralizing DDoS attacks. Training includes techniques for detecting, mitigating and recovering from attacks.

Ensure the security of your mobile apps.

Delve into advanced cybersecurity topics.

Penetration testing for network security.

Ensure the security of your web applications.

Learn how to analyze IT security incidents.

Ensure information security in your organization.

Learn methods for effective information analysis.

Secure your infrastructure with Cloudflare CDN. Learn how to protect your sites from DDoS attacks and optimize their performance.

Take care of your application security. Learn modern approaches to protecting your software and minimizing the risks of cyber threats.

Learn the principles of PKI and TLS-based security implementation. Practical training for IT professionals concerned with protecting data and communications.

Protect data and systems in the office - learn how to identify threats and respond according to cyber security best practices.