Online or onsite, instructor-led live Network Security training courses demonstrate through interactive discussion and hands-on practice the fundamentals of Network Security and cover topics such as detection, prevention and security testinig for beginners as well as advanced engineers.
Network Security training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Network Security training can be carried out locally on customer premises in Cardiff or in NobleProg corporate training centers in Cardiff.
NobleProg -- Your Local Training Provider
Cardiff
Radisson Blu Hotel, Meridian Gate - Bute Terrace, Cardiff, united kingdom, CF10 2FL
The Radisson Blu Hotel in Cardiff city centre is the perfect hub for your Welsh adventure
Close to several public transportation options, our hotel in Cardiff puts the city centre at your fingertips. Catch a train or a bus at one of the nearby stations, or take the M4 motorway and drive wherever you want to go in Wales and beyond. For those flying into the city, the Cardiff International Airport is just a 30-minute drive from the hotel. You’ll find parking around the hotel at the John Lewis, St David’s II and NCP Pellet Street car parks, plus some parking at the hotel. Enjoy shopping and dining within walking distance of the hotel, and explore the colourful history of this thriving capital city.
The hotel is located on Bute Terrace providing easy access to the M4 at junction 32 only 6 km away.
The central train and bus station is located within a five-minute walk from the hotel.
Cardiff International Airport is located 24 km from the hotel and can be reached by bus, train or taxi.
This instructor-led, live training in Cardiff (online or onsite) is aimed at intermediate-level network administrators who wish to gain the essential skills to manage, administer, monitor, and maintain Fortinet security systems.
By the end of this training, participants will be able to:
Configure and manage FortiGate firewalls.
Monitor network traffic and manage incidents with FortiAnalyzer.
Automate tasks and manage policies through FortiManager.
Apply preventive maintenance strategies and troubleshoot network issues.
This instructor-led, live training in Cardiff (online or onsite) is aimed at beginner-level network administrators who wish to use FortiGate 1100E to manage and secure their network environments effectively.
By the end of this training, participants will be able to:
Understand the basic architecture and features of FortiGate 1100E.
Learn how to deploy FortiGate 1100E in various network environments.
Gain hands-on experience with basic configuration and management tasks.
This instructor-led, live training in Cardiff (online or onsite) is aimed at intermediate-level network administrators who wish to manage and secure their networks using FortiGate firewalls.
By the end of this training, participants will be able to:
Understand Fortigate features and functionalities, particularly those introduced or enhanced in version 7.4.
Configure and manage FortiGate devices and implement advanced security features.
Deploy and manage advanced security measures like IPS, antivirus, web filtering, and threat management.
Monitor network activities, analyze logs, and generate reports for auditing and compliance.
This instructor-led, live training in Cardiff (online or onsite) is aimed at intermediate-level technical professionals who wish to delve deeper into the technical aspects and functionalities of Fortinet’s product line to effectively recommend, sell, and implement Fortinet security solutions.
By the end of this training, participants will be able to:
Gain in-depth knowledge of Fortinet’s advanced security solutions and products.
Understand the technical features, benefits, and deployment scenarios for each core Fortinet product.
Configure, manage, and troubleshoot Fortinet solutions in diverse environments.
Apply Fortinet products to address complex security challenges and requirements.
This instructor-led, live training in Cardiff (online or onsite) is aimed at security professionals who wish to learn how to use Cortex XDR in preventing and stopping the occurrence of sophisticated attacks and threats.
By the end of this training, participants will be able to:
Understand the architecture and components of Cortex XDR.
Create and manage profiles for exploit and malware prevention.
Analyze behavioral threats and monitor response actions.
This instructor-led, live training in Cardiff (online or onsite) is aimed at beginner-level technical professionals who wish to learn the concept of the Security Fabric and how it evolved to address the cybersecurity needs of organizations.
By the end of this training, participants will be able to:
Learn the evolution of cybersecurity and how it has shaped current security technologies.
Use Fortinet products to protect against specific types of cyber threats and attacks.
Understand the integration and automation capabilities of Fortinet solutions in providing a coordinated response to cyber incidents.
This instructor-led, live training in Cardiff (online or onsite) is aimed at security professionals who wish to learn how to troubleshoot Palo Alto Networks' next-generation firewalls.
By the end of this training, participants will be able to:
Understand the architecture of the next-generation firewall.
Investigate and troubleshoot networking issues using firewall tools.
Analyze advanced logs to resolve real-life scenarios.
This instructor-led, live training in Cardiff (online or onsite) is aimed at beginner-level network security professionals who wish to learn the concept of cybersecurity and the current global threat landscape.
By the end of this training, participants will be able to:
Understand the current global threat landscape and identify the main types of cyber adversaries.
Recognize the primary types of malware and the mechanics of cyber attacks.
Understand the basics of network security and the importance of a layered security approach.
Learn about Fortinet's Security Fabric and how it addresses modern cybersecurity challenges.
This instructor-led, live training in Cardiff (online or onsite) is aimed at intermediate-level network and security professionals who wish to effectively implement, manage, and secure SD-WAN solutions.
By the end of this training, participants will be able to:
Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
Implement and manage security features within an SD-WAN.
Monitor, manage, and troubleshoot SD-WAN environments.
This instructor-led, live training in Cardiff (online or onsite) is aimed at intermediate-level network and security professionals who wish to effectively manage and secure networks using Fortigate 600E equipment, with a specific focus on HA configurations for enhanced reliability and performance.
By the end of this training, participants will be able to:
Understand the features, specifications, and operating principles of the Fortigate 600E firewall.
Perform the initial setup of the Fortigate 600E, including basic configuration tasks like setting up interfaces, routing, and initial firewall policies.
Configure and manage advanced security features such as SSL VPN, user authentication, antivirus, IPS, web filtering, and anti-malware capabilities to protect against a variety of network threats.
Troubleshoot common issues in HA setups and effectively manage HA environments.
This instructor-led, live training in Cardiff (online or onsite) is aimed at security professionals who wish to learn how to manage firewalls at scale.
By the end of this training, participants will be able to:
Design, configure, and manage the Panorama FireWall management server.
Manage policies using device groups.
Roll out network configurations to different firewalls.
This instructor-led, live training in Cardiff (online or onsite) is aimed at intermediate-level IT professionals who wish to effectively use and manage Sophos XG Firewall to enhance the security posture of their organizations or clients.
By the end of this training, participants will be able to:
Understand the features and capabilities of Sophos XG Firewall.
Perform initial setup, configure network interfaces, and create and manage firewall policies and rules.
Understand how to integrate with various authentication services.
Utilize Sophos XG Firewall's monitoring and reporting tools to maintain oversight of network security.
This instructor-led, live training in Cardiff (online or onsite) is aimed at experienced network security managers who wish to gain the knowledge and skills needed to deploy, manage, and troubleshoot Fortinet's FortiGate security appliances running on FortiOS 7.2 as an NSE4 Network Security Professional.
By the end of this training, participants will be able to:
Understand Fortinet's product portfolio and the role of FortiOS in network security.
This instructor-led, live training in Cardiff (online or onsite) is aimed at security professionals who wish to learn the fundamentals of managing Palo Alto Networks' next-generation firewalls.
By the end of this training, participants will be able to:
Configure and manage Palo Alto Networks' firewall essential features.
This instructor-led, live training in Cardiff (online or onsite) is aimed at systems administrators who wish to learn how to use Zscaler to secure network connections for applications and cloud services.
By the end of this training, participants will be able to:
Learn and understand the architecture security on Zscaler.
Understand the value and baseline features of Zscaler advanced configurations.
Use Zscaler to secure network connections for applications and cloud services.
This instructor-led, live training in Cardiff (online or onsite) focuses on network security from a software security perspective. Participants will learn about common network attacks and defenses across OSI layers, with a strong emphasis on application-layer threats such as session hijacking and denial-of-service (DoS) attacks.By the end of this training, participants will be able to:
Understand key concepts in IT security and secure coding.
Identify and mitigate network threats at different OSI layers.
Apply cryptographic methods in real-world scenarios.
Implement and configure security protocols securely.
Recognize and address cryptographic vulnerabilities and exploits.
Access resources for ongoing secure coding practices.
This instructor-led, live training in Cardiff (online or onsite) is aimed at security engineers and system administrators who wish to use FortiGate NGFW's advanced security-driven network systems to protect their organization from internal and external threats.
By the end of this training, participants will be able to:
Install and configure the preferred FortiGate NGFW software and hardware model.
Operate and employ FortiGate NGFW to improve the efficiency of system administration tasks.
Manage various forms of external and internal threats using FortiGate features.
Integrate FortiGate security fabric with the entire IT infrastructure to provide quick automated protection.
Ensure long-term protection from attacks with independent and continuous FortiGate threat intelligence.
Troubleshoot the most common firewall system setup errors relevant to FortiGate NGFWs.
Implement Fortinet security solutions in other enterprise applications.
Why should you attend?
The Certified Lead Ethical Hacker training course enables you to develop the necessary expertise to perform information system penetration tests by applying recognized principles, procedures and penetration testing techniques, in order to identify potential threats on a computer network. During this training course, you will gain the knowledge and skills to manage a penetration testing project or team, as well as plan and perform internal and external pentests, in accordance with various standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Moreover, you will also gain a thorough understanding on how to draft reports and countermeasure proposals. Additionally, through practical exercises, you will be able to master penetration testing techniques and acquire the skills needed to manage a pentest team, as well as customer communication and conflict resolution.
The Certified Lead Ethical Hacking training course provides a technical vision of information security through ethical hacking, using common techniques such as information gathering and vulnerability detection, both inside and outside of a business network.
The training is also compatible with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
After mastering the necessary knowledge and skills in ethical hacking, you can take the exam and apply for the "PECB Certified Lead Ethical Hacker" credential. By holding a PECB Lead Ethical Hacker certificate, you will be able to demonstrate that you have acquired the practical skills for performing and managing penetration tests according to best practices.
Who should attend?
Individuals interested in IT Security, and particularly in Ethical Hacking, to either learn more about the topic or to start a process of professional reorientation.
Information security officers and professionals seeking to master ethical hacking and penetration testing techniques.
Managers or consultants wishing to learn how to control the penetration testing process.
Auditors wishing to perform and conduct professional penetration tests.
Persons responsible for maintaining the security of information systems in an organization.
Technical experts who want to learn how to prepare a pentest.
Cybersecurity professionals and information security team members.
This instructor-led, live training in Cardiff (online or onsite) is aimed at software testers who wish to protect their organization's network with Nmap.
By the end of this training, participants will be able to:
Set up the necessary testing environment to start using Nmap.
Scan network systems for security vulnerabilities.
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.
In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.
By the end of this training, participants will be able to:
Install and configure OpenVAS
Learn the fundamental features and components of OpenVAS
Configure and implement network vulnerability scans with OpenVAS
Review and interpret OpenVAS scan results
Audience
Network engineers
Network administrators
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in Cardiff (online or onsite) is aimed at developers who wish to prevent malware intrusion with Palo Alto Networks.
By the end of this training, participants will be able to:
Set up the necessary development environment to start developing firewalls.
This instructor-led, live training in Cardiff (online or onsite) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.
Online Network Security training in Cardiff, Network Security training courses in Cardiff, Weekend Network Security courses in Cardiff, Evening Network Security training in Cardiff, Network Security instructor-led in Cardiff, Network Security on-site in Cardiff, Evening Network Security courses in Cardiff, Network Security trainer in Cardiff, Weekend Network Security training in Cardiff, Network Security private courses in Cardiff, Network Security coaching in Cardiff, Network Security one on one training in Cardiff, Network Security instructor-led in Cardiff, Network Security classes in Cardiff, Online Network Security training in Cardiff, Network Security boot camp in Cardiff, Network Security instructor in Cardiff