Michele M Jordan

PTR Associates, Ltd.

This 3 day instructor led course is task orientated and teaches the skills needed to describe, configure, verify and manage the PIX Firewalls.

VPN Dynamics, Inc.

The CSSA Instructor-led Training is designed to reinforce the foundational knowledge in the SonicWALL Technical e*Training courses. These courses provide the hands-on experiential training that will enhance problem solving and provide dynamic feedback in ...

Access 2 Networks, Inc.

The Check Point Secure Platform Boot Camp is an intensive 5-day instructor-led course, which introduces the security administrator to Check Point's Secure Platform and Check Point NG. The course provides the information and experience necessary to deploy ...

WatchGuard Training Partners

Firewall Basics with WFS A three-day course that focuses on the design and implementation of a corporate security policy using the WatchGuard System Manager management software and the award-winning WFS appliance software. This course prepares you for th ...

The VPN Specialist is a combination of the Cisco Secure Virtual Private Networks (CSVPN) course and the Securing Cisco Network Devices (SND) course, both delivered together in one 5-day class. Because of the accelerated nature of the course, be prepared f ...

Learning Tree, International

VPNs can provide significant business benefits by allowing remote users and multiple sites to communicate securely across shared networks, including the Internet. IPsec provides the technology to implement secure VPNs. You learn to apply the standards an ...

In this instructor-led, lab-intensive course, get the knowledge and skills needed to describe, configure, verify, and manage the Cisco Virtual Private Network (VPN) 3000 Concentrator, Cisco VPN Software Client, and Cisco VPN 3002 Hardware Client feature s ...

Red Hat, Inc

For Linux- and/or UNIX- systems administrators who want to build skills at configuring common network services and security administration using Red Hat Linux

Red Hat, Inc

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...

This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...

Leading Edge Business Solutions (Pty) Ltd

Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...

Learning Tree International

The UNIX family of operating systems, including the increasingly used Linux versions, is prized by IT professionals for its flexibility and openness. Vulnerabilities in standard configurations, however, can make UNIX systems susceptible to security threat ...

Experience in-depth coverage of Linux and Unix security issues. Examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memo ...

The Configuring Security on the Solaris 10 Operating System course provides students with the knowledge and skills to customize security on Solaris 10 systems.

Guru Labs, L.C

Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet filtering, password policies, and file integrity checking are covered. ...

IBM Corporation

This course focuses on network security and makes an excellent companion to: Enterprise Linux Security Administration (QLG55) After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to ca ...

Argus Systems Group, Inc

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with either UNIX or Linux. Learn how to operate your system in the Ar ...

Argus Systems Group, Inc

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with UNIX. * Learn how to operate your system in the Argus secure en ...

Systems & Network Training Ltd

A hands-on course focusing on security of UNIX systems. Hands on sessions will be with Red Hat Linux but the course covers all flavours of UNIX and highlights differences.

The Securing Windows track at SANS (SEC505) is a comprehensive set of courses for Windows security architects and administrators. It tackles tough problems like Active Directory forest design, how to use Group Policy to lock down desktops, deploying a Mic ...

Category Windows Security