Навучальныя курсы Cyber Security

Навучальныя курсы Cyber Security

Local instructor-led live Cyber Security training courses in Беларусь.

Cyber Security Course Outlines

Course Name
Duration
Overview
Course Name
Duration
Overview
14 hours
This instructor-led, live training in Беларусь (online or onsite) is aimed at security managers who wish to learn basic to intermediate-level CCTV security surveillance and management skills. By the end of this training, participants will be able to:
  • Familiarize the types of CCTV systems and know their benefits and features.
  • Understand cabling and CCTV systems setup requirements.
  • Install, configure, and manage CCTV systems.
14 hours
This instructor-led, live training in Беларусь (online or onsite) is aimed at security professionals who wish to learn and improve how to handle security threats and perform security risk assessments. By the end of this training, participants will be able to:
  • Manage security systems and handle any hostile environment.
  • Manage any security risks or threats.
  • Learn how to conduct security risk assessments.
14 hours
This instructor-led, live training in Беларусь (online or onsite) is aimed at service technicians, system admins, or anyone who wishes to learn proper installation, usage, and management of the Honeywell security system. By the end of this training, participants will be able to:
  • Learn the concepts of the Honeywell security systems and components.
  • Properly install and maintain a Honeywell security system.
  • Utilize the Honeywell maintenance tools and management suite to control a security system.
7 hours
Cyber Security is the practice of applying technologies, controls, and processes to protect computer systems, servers, networks, devices, programs, and data from malicious cyber attacks. This instructor-led, live training (online or onsite) is aimed at anyone who wish to learn how to protect internet-connected systems from different kinds of cyber threats. By the end of this training, participants will be able to:
  • Understand the concept of Cyber Security.
  • Learn and understand the different Cyber Security threats.
  • Learn processes and best practices to protect internet-connected systems from cyber attacks.
Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange.
7 hours
This instructor-led, live training in Беларусь (online or onsite) is aimed at developers and anyone who wishes to learn and use OAuth to provide applications with secure delegated access. By the end of this training, participants will be able to:
  • Learn the fundamentals of OAuth.
  • Understand the native applications and their unique security issues when using OAuth.
  • Learn and understand the common extensions to the OAuth protocols.
  • Integrate with any OAuth authorization server.
14 hours
This instructor-led, live training in Беларусь (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code. By the end of this training, participants will be able to:
  • Understand the features and structure of Snyk.
  • Use Snyk to find and fix code security issues.
  • Integrate Snyk in a software development lifecycle.
14 hours
Курс прапануе практычныя веды пра OpenStack і прыватную бяспеку ў хмары. У якасці прыкладу такіх сетак можна прывесці facebook і vkontakte, дзе любая фізічная асоба можа падаць рэкламную аб'яву.
28 hours
This instructor-led, live training in Беларусь (online or onsite) is aimed at developers, engineers, and architects seeking to secure their web apps and services. By the end of this training, participants will be able to integrate, test, protect, and analyze their web apps and services using the OWASP testing framework and tools.
35 hours
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. The purpose of the Ethical Hacking Training is to:
  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.
Audience: The Course is ideal for those working in positions such as, but not limited to:
  • Security Engineers
  • Security Consultants
  • Security Managers
  • IT Director/Managers
  • Security Auditors
  • IT Systems Administrators
  • IT Network Administrators
  • Network Architects
  • Developers
7 hours
In this instructor-led, live training Беларусь (online or onsite), we discuss CAS's architecture and features and practice installing and configuring a CAS server. By the end of this training, participants will be able to:
  • Have an understanding of CAS's implementation of SSO (Single-Sign-On Authentication).
  • Have the necessary practice to deploy and manage their own authentication server.
7 hours
Shadowsocks is an open-source, secure socks5 proxy. In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy. By the end of this training, participants will be able to:
  • Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
  • Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
  • Run Shadowsocks on mobile devices and wireless networks.
  • Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
  • Optimize a Shadowsocks server
Audience
  • Network engineers
  • System Administrators
  • Computer technicians
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice
7 hours
NetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling. In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods. By the end of this training, participants will be able to:
  • Understand how NetNORAD works
  • Learn the design principles behind NetNORAD
  • Use open-source NetNORAD tools with their own code to implement a fault detection system
Audience
  • Network engineers
  • Developers
  • System engineers
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice
14 hours
In this instructor-led, live training in Беларусь, participants will understand Internet of Things (IoT) architectures and learn the different IoT security solutions applicable to their organization. By the end of this training, participants will be able to:
  • Understand IoT architectures.
  • Understand emerging IoT security threats and solutions.
  • Implement technologies for IoT security in their organization.
7 hours
This course covers the basic concepts of security and IT Security, with an emphasis on defending against network attacks. Participants will gain an understanding of essential security protocols and security concepts of web services. Recent attacks against cryptosystems and some recent related vulnerabilities will be referrenced
14 hours
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN. In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment. By the end of this training, participants will be able to:
  • Assess their organization's existing security model.
  • Shift access controls from the perimeter to individual devices and users.
  • Deploy applications using a user and device-centric authentication and authorization workflow.
  • Understand, plan and implement a Zero Trust network within their organization.
Audience
  • Network engineers
  • Cyber security professionals
  • System architects
  • IT managers
Format of the Course
  • Part lecture, part discussion, exercises and heavy hands-on practice
Note
  • To request a customized training for this course, please contact us to arrange.
14 hours
This course is designed to help the attendee to build organizational resilience against a range of threats so that organizations can respond effectively to incidents, maintain the availability of business operations and safeguard its interests. 
7 hours
This course discusses how to manage an incident response team, how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge
 
21 hours
Automotive адносіцца да бяспекі аўтамабільных электронных сістэмаў, камунікацыйных сетак, алгоритмаў кантролю, праграмы, карыстальнікаў і асноўных дадзеных ад злоякісных атак, шкоды, неадпаведнага даступу, або маніпуляцыі. Гэта інструктар-праведзены, жывы трэнінг (онлайн або на сайце) звязаны з інжынерамі, якія хочуць абараніць звязаныя аўтамабілі ад кібер-атакаў. У канцы гэтага трэніру ўдзельнікі зможаць:
    Заявы і абмоўкі пра абмежаванне адказнасці ў аўтамабільных сістэмах. Выбраць найбольш прыдатныя тэхналогіі, інструменты і прыкметнікі.
Формат курса
    Інтэрактыўныя лекцыі і дискусіі. Многія практыкаванні і практыкаванні. Вынікі ў Live-Lab Environment.
Вынікі пошуку - Customization options
    Калі вы хочаце падзяліцца сваёй думкай з майстрам, рабіце гэта максімальна ветліва.
14 hours
Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange
7 hours
  • After this one day seminar the attendee will be able to demonstrate knowledge and understanding of Cloud Computing.
14 hours
The RESILIA  course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.    
 
35 hours
This course explore the technical skills to implement, monitor and administer IT infrastructure using information security policies and procedures. And how to protecting the confidentiality, integrity and availability of data.    
 
7 hours
This course provides leaders and managers with an overview of issues and activities associated with cybersecurity. Leaders will receive information in various topics that will build their knowledge and hone executive decision-making in regard to the cybersecurity threat.    
  By the end of this training, participants will be able to:
  • Understand the Internet, social network Privacy
  • Know PII and why it is important
  • Know how to secure the Online Activates
  • Know how to maintain the Privacy of business users
  • Know more of the Cyber laws that protect the Privacy
Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange.
7 hours
This course cover the basics of PKI, the basics of encryption, the Encrypting File System currently used by Windows 7 and Windows 8, the creation of a PKI using a variety of software and looking at tools which can exploit flaws in the implementation of a PKI.     
 
7 hours
This course cover the considertion of security and Privacy in the architecture, and how to design the security in the preperation of the design phase, the course also cover many technical controls to be designed in the architecture.
14 hours
This two days course s designed for those with some data protection responsibilities in an
organization or who, for other reasons, wish to achieve and demonstrate a broad
understanding of the law, including the EU General Data Protection Regulation (GDPR) and
the UK Data Protection Bill and their practical application. It is recognized that those with
overall responsibility for data protection within an organization will need to develop a detailed
understanding of the law"    
14 hours
The Payment Card Industry Professional training course provides an individual qualification
for industry practitioners who wish to demonstrate their professional expertise and
understanding of the PCI Data Security Standard (PCI DSS).
 
7 hours
This course discusses how to manage an incident response team. how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response team requires special skills and knowledge
7 hours
The course is intended for those requiring intelligence or evidence from the Dark Web. This will usually be those working in government or law enforcement though may also be in the private sector.

Last Updated:

Online Cyber Security courses, Weekend Cyber Security courses, Evening Cyber Security training, Cyber Security boot camp, Cyber Security instructor-led, Weekend Cyber Security training, Evening Cyber Security courses, Cyber Security coaching, Cyber Security instructor, Cyber Security trainer, Cyber Security training courses, Cyber Security classes, Cyber Security on-site, Cyber Security private courses, Cyber Security one on one training

Course Discounts

No course discounts for now.

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking for a good mixture of IT and soft skills in Belarus!

As a NobleProg Trainer you will be responsible for:

  • delivering training and consultancy Worldwide
  • preparing training materials
  • creating new courses outlines
  • delivering consultancy
  • quality management

At the moment we are focusing on the following areas:

  • Statistic, Forecasting, Big Data Analysis, Data Mining, Evolution Alogrithm, Natural Language Processing, Machine Learning (recommender system, neural networks .etc...)
  • SOA, BPM, BPMN
  • Hibernate/Spring, Scala, Spark, jBPM, Drools
  • R, Python
  • Mobile Development (iOS, Android)
  • LAMP, Drupal, Mediawiki, Symfony, MEAN, jQuery
  • You need to have patience and ability to explain to non-technical people

To apply, please create your trainer-profile by going to the link below:

Apply now!

This site in other countries/regions