TOP Express courses on information security
Miscellaneous / / November 28, 2023
Administration of UserGate 6 firewalls
Advanced training program. The course is intended for information security professionals responsible for implementing and maintaining firewalls. This course covers installation and configuration of UserGate firewalls. You will learn how to perform installation and initial configuration, create configuration and fault tolerance clusters, create a security policy, including SSL inspection, user access control, intrusion prevention system configuration, VPN tunnels and many others functions.
3,8
Ensuring the security of significant objects of critical information infrastructure
The course is for those who have encountered the area of Critical Information Infrastructure (CII) in their work. The course involves studying regulatory documents on CII, discussing actions at all stages of work on categorization and protection of CII objects, analysis of practical options for solving the main problem moments.
4,1
Comprehensive protection of information objects
The program was developed in accordance with legal and regulatory acts in the field of information security put into effect decrees of the President of the Russian Federation, decrees of the Government of the Russian Federation and organizational and administrative documents of the FSB Russia. Clarifications on the main issues related to courses agreed with the FSTEC and the FSB
3,8
Main security vulnerabilities of WEB applications
The course introduces students to the most popular modern web application vulnerabilities from the OWASP list Top-10 2017, ways to identify them statically and dynamically, as well as reliable methods of elimination vulnerabilities. All theoretical knowledge studied is supported by a significant number of practical tasks.
4
KaliLinux "System Security Testing".
Advanced training program. This program is intended to train specialists responsible for ensuring information security in telecommunication systems and networks and administration of software included in KaliLinux. The goal of the course is to gain the knowledge and skills necessary to successfully identify and resolve security problems in enterprise information systems. The course is devoted to methods of conducting penetration testing in the context of in-depth analysis of the security of computer networks and information systems. The course provides detailed materials on the operation of information systems and networks. The sequences of numerous attacks are described and recommendations are proposed for strengthening the security of information systems and networks.
3,8
Web application security testing
With the widespread use of web technologies, security and information protection issues are relevant. Completing this course gives you the opportunity to use real life examples to consider the main ways attacks on web applications according to the OWASP project, study the details of each vulnerability and methods testing.
3,9
Linux Network Administration
Advanced training program. If you already have strong user-level skills with the Linux operating system and are familiar with working on the command line, then you You will certainly be interested in the four-day course LL-103 Linux OS Network Administration developed by specialists from the Softline Training Center, which will allow you to gain theoretical foundations about Linux OS network services and their configuration, as well as basic knowledge in the field of information security. The course consists of ten modules and is conducted by certified trainers of the Softline Training Center, taking into account the professional skills, knowledge, and experience of students. Training takes place face-to-face in equipped classrooms of the Softline Training Center in 11 cities of Russia (Moscow, St. Petersburg, Yekaterinburg, Kazan, Krasnoyarsk, Nizhny Novgorod, Novosibirsk, Omsk, Rostov-on-Don and Khabarovsk) or online format. Based on the results of the training, a Softline Training Center certificate is issued.
3,7
Organization of the Service Desk. Incident and problem management (core elements of the approach)
Advanced training program. Three-day proprietary course “Organizing the work of the Service Desk. Incident and problem management (main elements of the approach)” is aimed at managers organizations and IT departments planning or implementing the practical implementation of relevant ITSM processes. To successfully master the course material, prior knowledge of the basics of ITIL is required. The course includes theoretical and practical parts and is available for listening remotely and in classes at the Softline Training Center in cities of Russia (Moscow, St. Petersburg, Yekaterinburg, Kazan, Krasnoyarsk, Nizhny Novgorod, Novosibirsk, Omsk, Rostov-on-Don and Khabarovsk). Based on the results of training in the course “Organizing the work of the Service Desk. Incident and problem management (main elements of the approach)” is issued a certificate from the Softline Training Center.
3,7
Protecting information using cryptographic methods
Secrets and features of the most popular area of information security, taking into account current innovations in legislation. This course provides a detailed analysis of technologies and methods of cryptographic information protection (electronic signature, encryption, blockchain hashing, etc.), as well as provides practical guidance on organizing work with enhanced electronic signatures, machine-readable powers of attorney, the procedure for protecting web resources using TLS and other questions. The program is aimed at specialists from commercial organizations and government agencies responsible for information protection and the use of electronic signatures, as well as specialists and experts in other areas of IT and IB. During the training process, students are provided with information taking into account the current goals and objectives of digital transformation. Based on the results of completing the course, students will be able to independently determine the need and procedure for using cryptographic tools information protection, effectively organize work on the use of enhanced electronic signatures: from organizing the receipt of qualified certificates in departmental certification centers (Federal Tax Service, Treasury) to ensure comprehensive verification of electronic signatures in information systems.
3,6
Advanced Excel 2016 course.
The Softline Training Center conducts Excel courses using proprietary programs adapted by our specialists for Russian-speaking users. They are based on programs of authorized courses for PC users. The purpose of this program is to gain an in-depth understanding of the purpose and capabilities of Excel.
3,6
Fundamentals of licensing enterprises and organizations for activities related to the development, production, and distribution of encryption tools
This program is intended to prepare organizations that are applicants for a license from the FSB of Russia to develop, production, distribution of encryption (cryptographic) tools planning to carry out activities to work with tachographs; development, maintenance or sale of information systems using SZKI; working with electronic digital signature (EDS); provide services to third-party organizations for submitting financial statements to the Federal Tax Service, etc. The following can be trained: managers (or responsible persons) of applicant organizations licenses of the FSB of Russia for activities related to the development, production, distribution of encryption (cryptographic) tools planning to carry out activities to work with tachographs; development, maintenance or sale of information systems using SZKI; working with electronic digital signature (EDS); provide services to third-party organizations for submitting financial statements to the Federal Tax Service, etc.
3,2