Michele M Jordan

VPN Dynamics, Inc.

The CSSA Instructor-led Training is designed to reinforce the foundational knowledge in the SonicWALL Technical e*Training courses. These courses provide the hands-on experiential training that will enhance problem solving and provide dynamic feedback in ...

ModifiedNever
Access 2 Networks, Inc.

The Check Point Secure Platform Boot Camp is an intensive 5-day instructor-led course, which introduces the security administrator to Check Point's Secure Platform and Check Point NG. The course provides the information and experience necessary to deploy ...

ModifiedNever
WatchGuard Training Partners

Firewall Basics with WFS A three-day course that focuses on the design and implementation of a corporate security policy using the WatchGuard System Manager management software and the award-winning WFS appliance software. This course prepares you for th ...

ModifiedNever

The VPN Specialist is a combination of the Cisco Secure Virtual Private Networks (CSVPN) course and the Securing Cisco Network Devices (SND) course, both delivered together in one 5-day class. Because of the accelerated nature of the course, be prepared f ...

ModifiedNever
Learning Tree, International

VPNs can provide significant business benefits by allowing remote users and multiple sites to communicate securely across shared networks, including the Internet. IPsec provides the technology to implement secure VPNs. You learn to apply the standards an ...

ModifiedNever
Commercial
Pricing Model

In this instructor-led, lab-intensive course, get the knowledge and skills needed to describe, configure, verify, and manage the Cisco Virtual Private Network (VPN) 3000 Concentrator, Cisco VPN Software Client, and Cisco VPN 3002 Hardware Client feature s ...

Modified
Red Hat, Inc
Commercial
Pricing Model

For Linux- and/or UNIX- systems administrators who want to build skills at configuring common network services and security administration using Red Hat Linux

Modified
Red Hat, Inc
Commercial
Pricing Model

Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...

Modified
Commercial
Pricing Model

This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...

Modified
Leading Edge Business Solutions (Pty) Ltd

Linux and other operating systems face a number of threats in a networked environment. It is possible to secure Linux against these threats. The Leading Edge Linux Security course provides an understanding of the security threats as well as the techniques ...

ModifiedNever
Learning Tree International

The UNIX family of operating systems, including the increasingly used Linux versions, is prized by IT professionals for its flexibility and openness. Vulnerabilities in standard configurations, however, can make UNIX systems susceptible to security threat ...

ModifiedNever
Commercial
Pricing Model

Experience in-depth coverage of Linux and Unix security issues. Examine how to mitigate or eliminate general problems that apply to all Unix-like operating systems, including vulnerabilities in the password authentication system, file system, virtual memo ...

Modified
Commercial
Pricing Model

The Configuring Security on the Solaris 10 Operating System course provides students with the knowledge and skills to customize security on Solaris 10 systems.

Modified
Guru Labs, L.C
Commercial
Pricing Model

Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet filtering, password policies, and file integrity checking are covered. ...

Modified
IBM Corporation

This course focuses on network security and makes an excellent companion to: Enterprise Linux Security Administration (QLG55) After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to ca ...

ModifiedNever
Argus Systems Group, Inc
Commercial
Pricing Model

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with either UNIX or Linux. Learn how to operate your system in the Ar ...

Modified
Argus Systems Group, Inc
Commercial
Pricing Model

This training is appropriate for system security officers, system administrators, applications integrators, and other users of the Argus security systems. The course assumes familiarity with UNIX. * Learn how to operate your system in the Argus secure en ...

Modified
Systems & Network Training Ltd

A hands-on course focusing on security of UNIX systems. Hands on sessions will be with Red Hat Linux but the course covers all flavours of UNIX and highlights differences.

ModifiedNever
Commercial
Pricing Model

The Securing Windows track at SANS (SEC505) is a comprehensive set of courses for Windows security architects and administrators. It tackles tough problems like Active Directory forest design, how to use Group Policy to lock down desktops, deploying a Mic ...

Category Windows Security
Modified
Learning Tree International
Commercial
Pricing Model

You Will Learn How To * Apply Windows Server 2008 features to secure your infrastructure * Deploy a Windows-based Public Key Infrastructure (PKI) as a foundation for security services * Enhance access controls with policy-based multifactor ...

Category Windows Security
Modified