Essentials 2: Extended Firewall Management
Essentials 2: Extended Firewall Management
Extended Firewall Management is the next-level follow-on course to Palo Alto Network’s Installation, Configuration, and Management (PAN-EDU-201). This course expands on 201 course topics while ...
SSCP Domain : Networks and Telecommunications Part 1
In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers various aspects of secure digital ...
SSCP Domain : Networks and Telecommunications Part 2
In the fast paced business world of today, secure and reliable communication within your corporation and with outside networks is mandatory. This course covers such topics as authentication and data ...
SSCP Domain : Risk, Response, and Recovery
With more and more business success relying on secure and guaranteed access to data, having plans and policies in place to manage risks and recover from disasters is pivotal. This course provides the ...
SSCP Domain : Security Operations and Administration Part 1
Information is often at the core of business, and maintaining the security of that information in the digital age is of utmost importance. This course provides the learner with the skills needed to ...
SSCP Domain : Security Operations and Administration Part 2
Information is often at the core of business, and maintaining the security of that information in the digital age is of utmost importance. This course provides the learner with the skills needed to ...
With the increasing growth of the Internet and networks in general being used for business, security is an important issue. A key aspect of business security is controlling which users have access to ...
In modern business and IT, keeping information secure and/or proving from where it originated can be key aspects of success. Cryptography provides the tools necessary to guarantee confidentiality and ...
In the modern world of computing, malicious code is becoming commonplace. Organizations and individuals must protect themselves from these attacks. This course provides a history of malicious code ...