Anyák napja egész évben
A tanfolyamon a hallgatók elsajátíthatják a számítógépes hálózatok tervezését és üzemeltetését biztonsági szempontból.
hálózati és operációs rendszer alapismeretek
A tanfolyamon a hallgatók rendkívül széles körű ismereteket kapnak a biztonságos webes programozásban, a kliens- és a szerveroldali támadási területek feltérképezésében és a védelem kiépítésében.
The CASE Java program is designed to be a hands-on, comprehensive application security training course that will help software professionals create secure applications. It trains software developers on the critical security skills and knowledge required throughout a typical software development lifecycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices required in today’s insecure operating environment.
CASE .NET goes beyond just the guidelines on secure coding practices but include secure requirement gathering, robust application design and handling security issues in post development phases of application development. This makes CASE one of the most comprehensive certifications for secure software development in the market today. It’s desired by software application engineers, analysts, testers globally and respected by hiring authorities. The hands-on training program encompasses security activities involved in all phases of the Secure Software Development Lifecycle (SDLC): planning, creating, testing and deploying an application.
Learn basic concepts and develop skills necessary to administer IT security fundamental tasks.
Validate and enhance your skills and optimally manage Check Point advanced security management systems.
A tanfolyamon a hallgatók elsajátíthatják a nemzetközileg elismert CompTIA A+ gyártó semleges minősítés megszerzéséhez szükséges ismereteket: a telepítést, a megelőző karbantartást, a hálózatok ismeretét, a biztonsági beállításokat és a hibakeresést. A tanfolyam a nemzetközileg elismert CompTIA A+ Core 1 (220-1001) éa Core 2 (220-1002) vizsgákra készít fel.
A tanfolyamon a hallgatók általános hálózat technológiai funkciókat sajátítanak el, gyártó-semleges hálózatok összeállításán, konfigurálásán, biztosításán keresztül. A tanfolyam a nemzetközileg elismert CompTIA Network+ vizsgára készít fel.
The Designing HPE Hybrid IT Rev. 19.21 course is design to teach students the intermediate level skills to plan, design, recommend, and demonstrate HPE Hybrid IT solutions and deliver a proof-of-concept for a given solution to a customer. The course is five days in duration and includes lectures and activities in the ratio of approximately 25/75 (lecture/activities). Activities include sizing exercises using tools available from sources such as the HPE Partner Portal and exercises using HPE emulators.
This course teaches students how to identify, recommend, and explain HPE Nimble storage solutions. It covers the HPE Nimble hardware and software, initial configuration, HPE Nimble Storage Volumes, snapshots, and replication.
The course uses participant centered learning and hands-on labs.
This course teaches students about HPE server architectures and associated technologies as well as their functions, features, and benefits. Additionally, students will learn about planning and designing HPE server solutions and positioning HPE server solutions to customers.
This course uses participant centered learning and hands-on emulators. Emulators use software to replicate HPE Server technologies and allow learners to engage in lab activities using web based resources.
The CCISO certification is an industry-leading program that recognises the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development and the financial expertise vital for leading a highly successful IS program. The CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
CEH is the world’s most advanced certified ethical hacking course that covers 20 of the most current security domains any individual will ever want to know when they are planning to beef-up the information security posture of their organisation.
This accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals.
The ECIH program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The comprehensive training program will make students proficient in handling as well as responding to various security incidents, such as network security incidents, malicious code incidents and insider attack threats.
CND is the world’s most advanced network defense course that covers 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect and respond to network attacks. The course contains hands-on labs based on major network security tools and aims to provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools.
The CSCU training program aims at equipping students with the necessary knowledge and skills to protect their information assets. This course covers the fundamentals of various computer and network security threats, such as identity theft, credit card fraud, phishing, virus and backdoors, email hoaxes, loss of confidential information, hacking attacks and social engineering.
CHFI v9 constitutes a detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skill-set for the identification of an intruder’s footprints and gathering the necessary evidence for their prosecution. All major tools and theories used by the cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals and anyone who is concerned about the integrity of the network and digital investigations.
The EDRP v3 course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an orginization. It also provides the networking professional with a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an understanding of the roles and relationships of various members of organisation, implementation of a plan and recovering from a disaster.
ECSA is a globally respected penetration testing program that covers the testing of modern infrastrucutres, operating systems and application environments while teaching students how to document and prepare a professional penetration testing report. This program takes the tools and techniques covered in CEH to the next level by utilizing EC-Council’s published penetration testing methodology.
The program offers a seamless learning progress, continuing where the CEH program left off. The new ECSAv10 includes updated curricula and an industry recognised comprehensive step-by- step penetration testing methodology. This allows a learner to elevate their ability in applying new skills learned through intensive practical labs and challenges.
The Engineering Cisco Meraki Solutions Part 1 (ECMS1) v1.1 is a one-day course that equips students with the knowledge and skills to confidently operate Cisco Meraki deployments. This instructor-led course includes live demos and guided lab practice. Students will learn how to implement core configurations for a full stack solution in the Meraki Dashboard and how to leverage essential Meraki Dashboard tools for troubleshooting.
Create custom log sources to utilize events from uncommon sources
Create, maintain, and use reference data collections
Develop and manage custom rules to detect unusual activity in your network
Develop and manage custom action scripts to for automated rule reponse
Develop and manage anomoly detection rules to detect when unusual network traffic patterns occur
After completing this course, you should be able to perform the following tasks:
Describe how QRadar SIEM collects data to detect suspicious activities
Describe the QRadar SIEM component architecture and data flows
Navigate the user interface
Investigate suspected attacks and policy violations
Search, filter, group, and analyze security data
Investigate events and flows
Investigate asset profiles
Describe the purpose of the network hierarchy
Determine how rules test incoming data and create offenses
Use index and aggregated data management
Navigate and customize dashboards and dashboard items
Create customized reports
Use AQL for advanced searches
Analyze a real world scenario
The Implementing and Administering Cisco Solutions (CCNA) v1.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture and hands-on labs, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation, and software-defined networking.
This course teaches you how to implement and operate enterpriselevel Aruba campus switching solutions. Hand-on labs give you experience with ArubaOS-Switches, including securing access, redundancy technologies such as Multiple Spanning Tree Protocol (MSTP), link aggregation techniques including Link Aggregation Protocol (LACP) and switch virtualization with HPE’s Virtual Switching Framework (VSF). You will also learn to configure dynamic routing with Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP), network optimization via Quality of Service (QoS), IP multicast routing leveraging Protocol Independent Multicast (PIM), and protecting the network using Access Control Lists (ACLs). This course is approximately 30% lecture and 70% hands on lab exercises.
A tanfolyamon a hallgatók elsajátíthatják az IT rendszerek betörésvédelmi tesztelését. Professzionális szinten lesznek képesek megkeresni egy hálózat, szerver vagy számítógép gyenge pontjait, a feltárt hiányosságokra azonnali megoldást tudnak ajánlani. Magyarországon egyedülálló tanfolyam.
This course teaches the HPE OneView 5.X infrastructure management solution and is the supporting training course for the exam requirement in the certification HPE Product Certified - OneView .
Topics covered in this course include:
• HPE OneView architectural model
• Product features and functions
• How to configure
• How to recommend and demonstrate
IT biztonság profiknak, a támadók felől megközelítve: milyen eszközökkel dolgoznak és hogyan lehet ellenük védekezni. Az egyes támadás típusok gyakorlati bemutatása mellett az azokat csökkentő ill. elhárító védekezési módszerekkel és a behatolásérzékeléssel is részletesen foglalkozunk.