EncartaLabs

Security (223 Courses)

Barracuda

Barracuda CloudGen Firewall - Application Control Barracuda CloudGen Firewall - AWS
Barracuda CloudGen Firewall - Foundation Barracuda CloudGen Firewall - Microsoft Azure
Barracuda CloudGen Firewall - Remote Access Barracuda Web Application Firewall - Foundation

BeyondTrust

BeyondTrust Password Safe Administration BeyondTrust Privileged Management for Windows
BeyondTrust Privileged Remote Access for Administrators BeyondTrust Remote Support for Administrators

Check Point

Check Point - Automation Specialist (CCAS) Check Point - Cyber Security Administrator (CCSA)
Check Point - Cyber Security Expert (CCSE) Check Point - Endpoint Specialist (CCES)
Check Point IPS Check Point - Multi-Domain Security Management Specialist (CCMS)
Check Point Security Master Check Point - Cloud Specialist
Check Point - Security Expert (CCSER) Check Point Troubleshooting Expert (CCTE)
Check Point - VSX Specialist (CCVS)

Commvault

Commvault - Advanced Infrastructure Design Commvault Engineer
Commvault - Essentials Commvault Master
Commvault Professional Advanced Commvault Professional Foundations

Cyber Security

Certified Authorization Professional (CAP) Certified Cyber Forensics Professional (CCFP)
Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA)
Certified Information Systems Security Professional (CISSP) Certified Secure Software Lifecycle Professional (CSSLP)
CISSP-ISSAP CISSP-ISSEP
CISSP-ISSMP CompTIA Advanced Security Practitioner (CASP)
CompTIA Security+ Cyber Security Compliance & Mobility Course
Cyber Security Essentials Cyber Security Risk Assessment & Management
CyberSecurity Analyst+ (CySA+) Cybersecurity Investigations and Network Forensics Analysis
Cyberspace Operations Strategist and Planner Defending the Perimeter from Cyber Attacks
Defensive Cyber Operations Engineer Digital Forensics
Identity Management Introduction to Cyber Warfare and Operations Design
Social Media Security Professional (SMSP) Systems Security Certified Practitioner (SSCP)

F5 Networks

Configuring and Administering F5 SDC Configuring F5 SSL Orchestrator
F5 - Administering BIGIP F5 - Automating BIG-IP with Ansible
F5 - Automating BIG-IP with AS3 F5 Configuring BIG-IP - AAM (Application Acceleration Manager)
F5 Configuring BIG-IP - Advanced WAF F5 Configuring BIG-IP - AFM (Advanced Firewall Manager)
F5 Configuring BIG-IP - APM (Access Policy Manager) F5 Configuring BIG-IP - DNS (Domain Name System)
F5 Configuring BIG-IP - LTM (Local Traffic Manager) F5 - Configuring BIG-IP on VIPRION
F5 - Configuring BIG-IQ F5 - Developing iRules for BIG-IP
F5 - Troubleshooting BIG-IP Securing Apps with F5 Solutions
Setting up F5 Advanced WAF

FireEye

FireEye Endpoint Security Administration FireEye Helix
FireEye Network Forensics FireEye Network Security Administration

Forcepoint

Forcepoint - Cloud Access Security Broker Administrator (CASB) Forcepoint - Data Loss Prevention Administrator
Forcepoint - Email Security Administrator Forcepoint NGFW - Administrator
Forcepoint Web Security - Administrator Forcepoint Web Security - Cloud Administrator

ForgeRock

Configuring the ForgeRock Identity Platform in a DevOps Environment ForgeRock Access Management
ForgeRock Directory Services ForgeRock Identity Gateway
ForgeRock Identity Governance ForgeRock Identity Management

Fortinet

Fortinet Advanced Threat Protection FortiGate Infrastructure
FortiGate NSE - Enterprise Firewall Fortinet NSE - FortiManager and FortiAnalyzer
FortiManager NSE - Fortinet Centralized Device Management FortiAnalyzer NSE - Fortinet Centralized Network Security Reporting
Fortinet NSE - FortiSiem FortiGate Security

Foundstone

Building Secure Software Forensics & Incident Response
Ultimate Hacking Ultimate Hacking: Expert
Ultimate Hacking: Web Ultimate Hacking: Windows Security
Ultimate Hacking: Wireless Writing Secure Code - ASP.NET (C#)
Writing Secure Code: Java (J2EE)

Imperva

Imperva SecureSphere Administration Imperva Web Application Security

ISO & Information Security

ISO/IEC 27001 Information Security - Lead Auditor ISO/IEC 27002 Information Security Controls - Lead Manager
ISO/IEC 27005 Information Security - Lead Risk Manager ISO/IEC 27032 - Lead Cybersecurity Manager
ISO/IEC 27035 - Lead Incident Manager ISO/IEC 27701 Privacy Information Management System - Lead Auditor
ISO 27799 Information Security Management - Lead Manager Lead Computer Forensics Examiner
Lead Ethical Hacker Lead SCADA Security Manager
ISO 21434

ISSA

Access Control, Authentication, and Public Key Infrastructure Auditing IT Infrastructures for Compliance
Fundamentals of Information Systems Security Legal Issues in Information Security
Managing Risk in Information Systems Network Security, Firewalls, and VPNs
Security Policies and Implementation Issues Security Strategies in Web Applications and Social Networking
Security Strategies in Windows Platforms and Applications Systems Forensics, Investigation, and Response

Kaspersky

Kaspersky Embedded Systems Security Kaspersky Endpoint Detection and Response
Kaspersky Endpoint Security - Encryption Kaspersky Endpoint Security and Management
Kaspersky Hybrid Cloud Security - Public cloud protection Kaspersky Security Center - Scaling
Kaspersky Security Center - Systems Management Kaspersky Security for Virtualization - Agentless
Kaspersky Security for Virtualization - Light Agent Kaspersky Security for Microsoft Exchange Servers
Kaspersky Security for Windows Server

McAfee

McAfee Advanced Threat Defense - Administration McAfee Application Control & Change Control - Administration
McAfee Data Loss Prevention - Endpoint McAfee Endpoint Security - Administration
McAfee ePolicy Orchestrator - Administration McAfee ePolicy Orchestrator and McAfee VirusScan
McAfee Network Data Loss Prevention - Administration McAfee Network Security Platform - Administration
McAfee Web Gateway - Administration

Okta

Implement Okta Access Gateway (OAG) Okta API Access Management with OAuth
Okta Customer Identity for Developers Okta Essentials

One Identity

One Identity Manager - Implementation One Identity Manager - Web Portal Development
One Identity Safeguard for Privileged - Passwords Implementation One Identity Safeguard for Privileged - Sessions Implementation
One Identity Syslog-ng - Premium Edition Implementation One Identity Syslog-ng - Store Box Implementation

Palo Alto Networks

Palo Alto Networks Firewall - Configuration & Management Palo Alto Networks Firewall - Optimizing Firewall Threat Prevention
Palo Alto Networks Firewall - Troubleshooting Palo Alto Networks Panorama - Managing Firewalls at Scale
Palo Alto Networks Panorama - Manage Multiple Firewalls Palo Alto Networks Traps - Endpoint Protection
Prisma Access SASE Security - Design & Operation Cortex XDR2 - Prevention, Analysis, and Response
Palo Alto Firewall - Improving Security Posture

Proofpoint

Proofpoint Archive - e-Discovery for Users Proofpoint Archive - Intelligent Supervision for Reviewers
Proofpoint - Intelligent Supervision for Administrators Proofpoint ITM - Administrator
Proofpoint ITM - Analyst Proofpoint Protection Server

SonicWall

SonicWALL Network Security Administration (SNSA) SonicWALL Network Security Professional (SNSP)
SonicWALL Secure Mobile Access Administration (SMAA)

Sophos

Sophos Administrator Central Endpoint and Server Sophos Administrator - XG Firewall

Symantec

Symantec Client Management Suite - Administration Symantec CloudSOC - Administration
Symantec Content Analysis - Administration Symantec Data Loss Prevention - Administration
Symantec Data Loss Prevention - Policy Authoring & Incident Remediation Symantec Deployment Solution - Administration
Symantec Encryption Management Server and Desktop - Administration Symantec Endpoint Protection - Configure and Protect
Symantec Endpoint Protection - Maintain and Troubleshoot Symantec Endpoint Protection - Manage and Administer
Symantec Endpoint Protection - Plan and Implement Symantec Endpoint Detection and Response - Administration
Symantec Endpoint Detection and Response - Planning & Implementation Symantec Ghost Solution Suite
Symantec Identity and Authentication Services Symantec IT Management Suite - Administration
Symantec Messaging Gateway - Administration Symantec ProxySG - Administration
Symantec Security Analytics - Administration Symantec SSL Visibility - Administration
Symantec Web Security Service - Core Administration Symantec Web Security Service - Diagnostics and Troubleshooting

Tanium

Tanium Administrator Tanium Essentials
Tanium Operations Essentials Tanium Security Essentials

Trend Micro and Microsoft Security Products

Forefront Threat Management Gateway 2010 Forefront Unified Access Gateway (UAG)
Trend Micro - Apex One Trend Micro - Deep Discovery
Trend Micro - Deep Security

WebSense

Websense Data Security Suite Websense Email Security Gateway
Websense Web Security Gateway

Zscaler

Zscaler Cloud Administrator - Internet Access Zscaler Cloud Administrator - Private Access

Miscellaneous

Application Security for Developers BCS - Information Assurance Architecture
Certified Information Systems Security Professional (CISSP) CyberArk
Endpoint Security and Network Access Control Forescout SilentDefens Administrator
Forescout SilentDefens Engineer Gigamon Foundation
Gigamon Inline Bypass Threat Prevention Hacking and Securing Cloud Infrastructure
HCISPP - HealthCare Information Security and Privacy Practitioner Intrusion Detection, Attacks and CounterMeasures
ISS - SiteProtector IT Security Awareness for Non-Technical Personnel
RESILIA Foundation SCADA Security
Securing Web Applications with Spring Security Securing Web Applications, Services and Servers
SOA Security Vulnerability Assessment

Contact us for any other unlisted or customized Security Trainings


Top