TOP Information Security Courses with Certificate
Miscellaneous / / November 29, 2023
Countering hacker attacks: protection, prediction, recognition, response
In the course “Countering Hacker Attacks: Protection, Prediction, Recognition, Response,” you will acquire the skills to detect and prevent hacker attacks and break-ins. You will learn how to build and maintain multi-level protection of a company's network.
4,2
Ensuring the security of significant objects of critical information infrastructure
The course is for those who have encountered the area of Critical Information Infrastructure (CII) in their work. The course involves studying regulatory documents on CII, discussing actions at all stages of work on categorization and protection of CII objects, analysis of practical options for solving the main problem moments.
4,1
KaliLinux "System Security Testing".
Advanced training program. This program is intended to train specialists responsible for ensuring information security in telecommunication systems and networks and administration of software included in KaliLinux. The goal of the course is to gain the knowledge and skills necessary to successfully identify and resolve security problems in enterprise information systems. The course is devoted to methods of conducting penetration testing in the context of in-depth analysis of the security of computer networks and information systems. The course provides detailed materials on the operation of information systems and networks. The sequences of numerous attacks are described and recommendations are proposed for strengthening the security of information systems and networks.
3,8
Protection of personal information
Study the features of collecting, storing and processing personal data, the specifics of Russian and international legislation. Master the necessary operating conditions for companies to comply with the requirements of legislation on personal data.
3,8
Compliance in the field of personal data
Training. Corporate governance. Information systems management. Right. Compliance. Working with data. Information Security. The program allows you to gain systemic knowledge and practical skills in the field of personal data legislation, taking into account the latest changes. On September 1, 2022, significant amendments to the Federal Law “On Personal Data” came into force. The second package of changes will take effect on March 1, 2023.
2,9
Cyber Security Online Course
Become a cybersecurity specialist, learn the hacker's mindset and learn how to protect your infrastructure! The most important and relevant knowledge that will help not only to enter information security, but also to understand the real state of affairs in the industry.
3
Security in Kubernetes
The strength of a chain is equal to the strength of its weakest link. Who is the weakest link in your cluster - the security guy who doesn't know Kubernetes? Devops that doesn't configure security? A developer who writes manifests for his application?
3,1
Linux Cyberpunk
A great journey through Linux OS. Understand the basics, study the [-light] and [-dark] capabilities of this system. And our pentesters will check your training server for vulnerabilities. Welcome to CyberYozh Academy.
3,1
KL002.12.1: Kaspersky Endpoint Security and Management
The course prepares you for the design, implementation and maintenance of network security systems built on Kaspersky Endpoint Security and centrally managed through Kaspersky Security Center. Theoretical material and laboratory work provide students with the necessary knowledge and skills to effectively carry out this work.
4,2
Administration of UserGate 6 firewalls
Advanced training program. The course is intended for information security professionals responsible for implementing and maintaining firewalls. This course covers installation and configuration of UserGate firewalls. You will learn how to perform installation and initial configuration, create configuration and fault tolerance clusters, create a security policy, including SSL inspection, user access control, intrusion prevention system configuration, VPN tunnels and many others functions.
3,8
Network Administration
Professional retraining and mini-MBA. The volume of the program is 250 hours. Professional retraining program in the specialty “Network Administration”: The program complies with professional standard 06.026 “Network and system administrator” Type of professional activity “Administration of information and communication (infocommunication) systems"
2,7
HACKER POINT
The largest practical course in RuNet, dedicated to attacking the infrastructure of companies. Train to work only with real tools that are used by top specialists. Have fun, but remember the consequences.
2,9
Main security vulnerabilities of WEB applications
The course introduces students to the most popular modern web application vulnerabilities from the OWASP list Top-10 2017, ways to identify them statically and dynamically, as well as reliable methods of elimination vulnerabilities. All theoretical knowledge studied is supported by a significant number of practical tasks.
4
Comprehensive protection of information objects
The program was developed in accordance with legal and regulatory acts in the field of information security put into effect decrees of the President of the Russian Federation, decrees of the Government of the Russian Federation and organizational and administrative documents of the FSB Russia. Clarifications on the main issues related to courses agreed with the FSTEC and the FSB
3,8
CYBER DETECTIVE
There is no case in which a spy would not be useful. You will learn to evaluate information from the point of view of the laws of logic, identify logical errors, connections between phenomena, see inconsistencies and beautifully expose liars.
2,9
Web application security testing
With the widespread use of web technologies, security and information protection issues are relevant. Completing this course gives you the opportunity to use real life examples to consider the main ways attacks on web applications according to the OWASP project, study the details of each vulnerability and methods testing.
3,9
Killer Android
Turn your Android smartphone into a real fighting machine. Learn to hide your identity, attack and defend yourself using your Android smartphone. The course is full of practice and instructions on how to monetize the acquired skills.
2,9
Linux Network Administration
Advanced training program. If you already have strong user-level skills with the Linux operating system and are familiar with working on the command line, then you You will certainly be interested in the four-day course LL-103 Linux OS Network Administration developed by specialists from the Softline Training Center, which will allow you to gain theoretical foundations about Linux OS network services and their configuration, as well as basic knowledge in the field of information security. The course consists of ten modules and is conducted by certified trainers of the Softline Training Center, taking into account the professional skills, knowledge, and experience of students. Training takes place face-to-face in equipped classrooms of the Softline Training Center in 11 cities of Russia (Moscow, St. Petersburg, Yekaterinburg, Kazan, Krasnoyarsk, Nizhny Novgorod, Novosibirsk, Omsk, Rostov-on-Don and Khabarovsk) or online format. Based on the results of the training, a Softline Training Center certificate is issued.
3,7