- All
- Agile and Scrum
- Amazon Web Services
- Applications
- Applications Development
- Applications Development & Programming
- Artificial intelligence
- Automation
- Azure kurs
- Big Data
- Blockchain
- Business Analysis
- Business Applications
- Business Continuity and Disaster Recovery
- Business Process
- Check Point
- Cisco
- Cisco Advanced Services (HTDLS)
- Citrix
- Cloud Computing
- Collaboration
- Commerce Solutions
- CompTIA
- Contact Center
- Containers
- CoPilot
- CQURE Academy
- CWNP
- Cyber Threat intelligence
- Cybersecurity Foundation & Awareness
- Cybersecurity Operations
- Data
- Data & AI
- Data Center
- Data Center & Virtualisation
- Data Loss Prevention
- Data Privacy
- Database Management & Development
- Desktop Applications
- DevOps
- DevOps Tools
- Docker
- E-Learning
- EC-Council
- EMC
- Enterprise Architecture
- Enterprise Services
- Ethical Hacking and Penetration Testing
- F5
- Forensics & Incident Response
- Forescout
- FORTINET
- Global Knowledge
- GRC - Governance Risk and Compliance
- Hewlett Packard Enterprise (HPE)
- IAPP
- IBM
- Identity & Access Management
- Infoblox
- Information Security Management and-or Cybersecurity Management
- Infrastructure Design
- Internet of Things (IoT)
- ISACA
- ISC2
- ISO
- ISTQB
- ITIL & Service Management
- Juniper
- Kubernetes
- Leadership & Business Skills
- Lean IT
- Lean Six Sigma
- Linux
- Micro Focus
- Microsoft
- Mirantis
- Mobile Device Management (MDM)
- Modern Workplace
- NETAPP
- Network Management
- Network Storage
- Nutanix
- Operating Systems
- Oracle
- Palo Alto Networks
- PMI
- PRINCE2
- Programming Languages
- Project Management
- Protection and Recovery
- Red Hat
- Risk & Governance
- Routing & Switching
- SAFe
- Sales Effectiveness
- Security
- Servers & Applications
- Service Management
- Service Management & ITIL
- Service Provider
- ServiceNow
- Software Development
- Software Testing
- Testing
- Third Party Courses
- Threat and Malware Protection
- TOGAF
- VEEAM
- Virtualisation
- VMware
- Voice
- Wireless
-
ServiceNow Security Incident Response (SIR) Implementation (SNSIRI)
Learn the domain knowledge, technical aspects, and various processes needed to effectively manage a Security Incident Response implementation (SIRI).
This two-day course covers the domain knowledge, common implementation technical aspects,…
-
CyberSec First Responder: Threat Detection and Response (CFR) (GK2180)
This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such…
-
System Forensics and Incident Handling (FOR)NOK 42.000
The secure infrastructure configuration should be the most important line of defense in every organization. Unfortunately, people, the most valuable resource, are not always aware of the level of…
-
EC-Council Certified Incident Handler (ECIH) + Exam voucher (ECIH)NOK 30.000
The latest revision of EC-Council's Certified Incident Handler (E|CIH) certified program has been designed and developed in collaboration with cybersecurity and incident handling/response practitioners across the globe.
The ECIH program…
-
EC-Council Computer Hacking Forensic Investigator (CHFI) + Exam voucher (CHFI)NOK 35.000
Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of…