TOP Information Security Courses
Miscellaneous / / November 27, 2023
Ensuring the security of significant objects of critical information infrastructure
The course is for those who have encountered the area of Critical Information Infrastructure (CII) in their work. The course involves studying regulatory documents on CII, discussing actions at all stages of work on categorization and protection of CII objects, analysis of practical options for solving the main problem moments.
4,1
Ethical hacking. Attack techniques and countermeasures
The course provides detailed materials on the operation of computer systems and networks. Typical vulnerabilities of network protocols, operating systems and applications are considered. The sequences of various types of attacks on computer systems and networks are described, and recommendations for strengthening the security of computer systems and networks are proposed.
4,2
Administration of UserGate 6 firewalls
Advanced training program. The course is intended for information security professionals responsible for implementing and maintaining firewalls. This course covers installation and configuration of UserGate firewalls. You will learn how to perform installation and initial configuration, create configuration and fault tolerance clusters, create a security policy, including SSL inspection, user access control, intrusion prevention system configuration, VPN tunnels and many others functions.
3,8
Protection of personal information
Study the features of collecting, storing and processing personal data, the specifics of Russian and international legislation. Master the necessary operating conditions for companies to comply with the requirements of legislation on personal data.
3,8
Cyber Security Online Course
Become a cybersecurity specialist, learn the hacker's mindset and learn how to protect your infrastructure! The most important and relevant knowledge that will help not only to enter information security, but also to understand the real state of affairs in the industry.
3
Security in Kubernetes
The strength of a chain is equal to the strength of its weakest link. Who is the weakest link in your cluster - the security guy who doesn't know Kubernetes? Devops that doesn't configure security? A developer who writes manifests for his application?
3,1
Linux Cyberpunk
A great journey through Linux OS. Understand the basics, study the [-light] and [-dark] capabilities of this system. And our pentesters will check your training server for vulnerabilities. Welcome to CyberYozh Academy.
3,1
Comprehensive protection of information objects
The program was developed in accordance with legal and regulatory acts in the field of information security put into effect decrees of the President of the Russian Federation, decrees of the Government of the Russian Federation and organizational and administrative documents of the FSB Russia. Clarifications on the main issues related to courses agreed with the FSTEC and the FSB
3,8
Network administration
Professional retraining and mini-MBA. The volume of the program is 250 hours. Professional retraining program in the specialty “Network Administration”: The program complies with professional standard 06.026 “Network and system administrator” Type of professional activity “Administration of information and communication (infocommunication) systems"
2,7
Anonymity and security
Turn your personal data and secrets into an impenetrable fortress. How much does the data on your devices cost? It is best if only you and no one else knows the value of your personal data. The value of data is not always determined by money. We have developed the program so that you can practice all possible vectors of attacks on your personal data and build protection. Under the guidance of experienced teachers and with new ideas that will appear in a private community of like-minded people.
2,9
Compliance in the field of personal data
Training. Corporate governance. Information systems management. Right. Compliance. Working with data. Information Security. The program allows you to gain systemic knowledge and practical skills in the field of personal data legislation, taking into account the latest changes. On September 1, 2022, significant amendments to the Federal Law “On Personal Data” came into force. The second package of changes will take effect on March 1, 2023.
2,9
Main security vulnerabilities of WEB applications
The course introduces students to the most popular modern web application vulnerabilities from the OWASP list Top-10 2017, ways to identify them statically and dynamically, as well as reliable methods of elimination vulnerabilities. All theoretical knowledge studied is supported by a significant number of practical tasks.
4
KaliLinux "System Security Testing".
Advanced training program. This program is intended to train specialists responsible for ensuring information security in telecommunication systems and networks and administration of software included in KaliLinux. The goal of the course is to gain the knowledge and skills necessary to successfully identify and resolve security problems in enterprise information systems. The course is devoted to methods of conducting penetration testing in the context of in-depth analysis of the security of computer networks and information systems. The course provides detailed materials on the operation of information systems and networks. The sequences of numerous attacks are described and recommendations are proposed for strengthening the security of information systems and networks.
3,8
Web application security testing
With the widespread use of web technologies, security and information protection issues are relevant. Completing this course gives you the opportunity to use real life examples to consider the main ways attacks on web applications according to the OWASP project, study the details of each vulnerability and methods testing.
3,9
HACKER POINT
The largest practical course in RuNet, dedicated to attacking the infrastructure of companies. Train to work only with real tools that are used by top specialists. Have fun, but remember the consequences.
2,9
Countering hacker attacks: protection, prediction, recognition, response
In the course “Countering Hacker Attacks: Protection, Prediction, Recognition, Response,” you will acquire the skills to detect and prevent hacker attacks and break-ins. You will learn how to build and maintain multi-level protection of a company's network.
4,2
Linux Network Administration
Advanced training program. If you already have strong user-level skills with the Linux operating system and are familiar with working on the command line, then you You will certainly be interested in the four-day course LL-103 Linux OS Network Administration developed by specialists from the Softline Training Center, which will allow you to gain theoretical foundations about Linux OS network services and their configuration, as well as basic knowledge in the field of information security. The course consists of ten modules and is conducted by certified trainers of the Softline Training Center, taking into account the professional skills, knowledge, and experience of students. Training takes place face-to-face in equipped classrooms of the Softline Training Center in 11 cities of Russia (Moscow, St. Petersburg, Yekaterinburg, Kazan, Krasnoyarsk, Nizhny Novgorod, Novosibirsk, Omsk, Rostov-on-Don and Khabarovsk) or online format. Based on the results of the training, a Softline Training Center certificate is issued.
3,7