Search results: 3008

This course provides the student with an understanding of security convergence and covers the general concepts involved in maintaining a secure network
computing environment. Upon successful completion of this course, students will be
able to examine, describe general SASE fundamentals and implement basic
networking configuration techniques.
- Teacher: Davy Cavens

This course provides the student with an understanding of security convergence and covers the general concepts involved in maintaining a secure network
computing environment. Upon successful completion of this course, students will be
able to examine, describe general SASE fundamentals and implement basic
networking configuration techniques.
- Teacher: faycal bensalah

This course provides the student with an understanding of security convergence and covers the general concepts involved in maintaining a secure network
computing environment. Upon successful completion of this course, students will be
able to examine, describe general SASE fundamentals and implement basic
networking configuration techniques.
- Teacher: Doru Balan

This course provides the student with an understanding of security convergence and covers the general concepts involved in maintaining a secure network
computing environment. Upon successful completion of this course, students will be
able to examine, describe general SASE fundamentals and implement basic
networking configuration techniques.
- Teacher: Doru Balan

This course provides the student with an understanding of security convergence and covers the general concepts involved in maintaining a secure network
computing environment. Upon successful completion of this course, students will be
able to examine, describe general SASE fundamentals and implement basic
networking configuration techniques.
- Teacher: Vitalijus Gurcinas

This course provides the student with a general understanding of how to install, configure, and manage firewalls for defense of enterprise network architecture. Students will learn the theory and configuration steps for setting up the security, networking, threat prevention, logging, and reporting features of next generation firewall technologies.
- Teacher: Lyvon Garth

This course provides the student with a general understanding of how to install, configure, and manage firewalls for defense of enterprise network architecture. Students will learn the theory and configuration steps for setting up the security, networking, threat prevention, logging, and reporting features of next generation firewall technologies.
- Teacher: Anthony Garner

In
this course, students will learn the fundamentals of cybersecurity related to business operations and identify
the concepts required to recognize attacks against
enterprise networks as well as mission critical business applications.
.
- Teacher: Steve Jones

In
this course, students will learn the fundamentals of cybersecurity related to business operations and identify
the concepts required to recognize attacks against
enterprise networks as well as mission critical business applications.
.
- Teacher: Matthew Frohlich
- Teacher: Nicklos See

In
this course, students will learn the fundamentals of cybersecurity related to business operations and identify
the concepts required to recognize attacks against
enterprise networks as well as mission critical business applications.
.

In
this course, students will learn the fundamentals of cybersecurity related to business operations and identify
the concepts required to recognize attacks against
enterprise networks as well as mission critical business applications.
.
- Teacher: David B Miller

In
this course, students will learn the fundamentals of cybersecurity related to business operations and identify
the concepts required to recognize attacks against
enterprise networks as well as mission critical business applications.
.
- Teacher: Davy Cavens

In
this course, students will learn the fundamentals of cybersecurity related to business operations and identify
the concepts required to recognize attacks against
enterprise networks as well as mission critical business applications.
.
- Teacher: Doru Balan
In this course, students will learn how to calculate security breach cost, identify assets, manage risk, and review cyber law associated with managing enterprise networks as well as mission critical business applications.

- Teacher: Matthew Frohlich
- Teacher: Nicklos See
In this course, students will learn how to calculate security breach cost, identify assets, manage risk, and review cyber law associated with managing enterprise networks as well as mission critical business applications.

- Teacher: Damien Naviliat
In this course, students will learn how to calculate security breach cost, identify assets, manage risk, and review cyber law associated with managing enterprise networks as well as mission critical business applications.

- Teacher: Erik Patynen
In this course, students will learn how to calculate security breach cost, identify assets, manage risk, and review cyber law associated with managing enterprise networks as well as mission critical business applications.

- Teacher: Erik Patynen
In this course, students will learn how to calculate security breach cost, identify assets, manage risk, and review cyber law associated with managing enterprise networks as well as mission critical business applications.

- Teacher: Doru Balan

In this course, students will learn the fundamentals of cybersecurity related to business operations and identify the concepts required to recognize attacks against enterprise networks as well as mission critical business applications.
- Teacher: Steve Jones

.