In this section

Share this page

Security Training courses

securiry header website 569x233

Every organization knows the importance of (cyber) security. Tremendous amounts of data are shared via numerous interfaces and devices. This infinite sharing of information in the 21st century has many benefits; however, it is not nearly as safe as it was 25 years ago.

Since organizations are opening up their IT services to an increasingly wider range of software applications that use all (mobile) devices imaginable, data security in part is dependent on other organizations. What’s more, IT is primarily responsible for ensuring the continuity of the company’s core business processes. A disruption can have a big impact on the availability of services and on the continuity of the company’s operations.

Therefore, security measures are a must in order to prevent problems or incidents of any kind and to keep risks such as identity theft, ransomware, phishing and other damaging cyber-attacks to a minimum.

As a leading training facility in security in Europe, Global Knowledge supports organizations in creating and maintaining a secure IT infrastructure, organization and data security by training and educating employees.

Global Knowledge provides education and training programmes in all areas and levels of security, whether you are looking for cybersecurity, security policy, designing and implementing secure networks, risk analysis, monitoring, troubleshooting or creating security awareness among employees, you will find the security training here that fits your needs.

The three areas of focus for optimum security

Good security consists of more than just technology. A well-defined IT security policy and promoting a culture in which every employee knows his or her responsibilities are just as important. Global Knowledge has mapped out the details of these three areas for optimum security.

Contract all results

Key

  • Public Classroom
  • Company Event
  • Virtual & Classroom Learning
  • Class Connect
  • e-Learning

Amazon Web Services

Security
Security Operations on AWS (GK3338)

Blue Coat

Security
Blue Coat Certified Proxy Administrator (BCCPA)
Blue Coat Certified Proxy Professional (BCCPP)

Check Point

Security
Check Point Security Administrator (CCSA R80) (T-VPN-01)
Check Point Security Expert (CCSE R77) (T-VPN-02)
Checkpoint Security Master (CCSM R77) (T-VPN-03)

Cisco

Security
Implementing Cisco Secure Access Control System (ACS)
CCIE Security - Lab Preparation (CCIESEC)
Implementing Cisco Network Security (IINS)
Cisco Identity Services Engine Update Training (ISE2)
Implementing Cisco Network Admission Control (NAC)
Cisco NGFW Technical Workshop (NGFWTW)
Securing Email with Cisco Email Security Appliance - Channel Partners (PASESA)
Cisco ASA Express Security (SAEXS)
Implementing Advanced Cisco ASA Security v2.1 (SASAA)
Implementing Core Cisco ASA Security (SASAC)
Implementing Cisco Bring Your Own Device Solutions (SBYOD)
Securing Cisco Networks with Threat Detection and Analysis (SCYBER)
Implementing Cisco Edge Network Security Solutions (SENSS)
Securing Email with Cisco Email Security Appliance (SESA)
Implementing Cisco Secure Mobility (SIMOS)
Implementing Cisco Secure Access Solutions (SISAS)
Implementing and Configuring Cisco Identity Services Engine (SISE)
Implementing Cisco Threat Control Systems (SITCS)
Managing Enterprise Security with Cisco Security Manager (SSECMGT)
Implementing Cisco Identity Services Engine for Wireless Engineers (SWISE)
Securing the Web with Cisco web Security Appliance (SWSA)

Cisco Advanced Services (HTDLS)

Security
Securing Networks with Firepower Threat Defense NGFW (FIREPOWER200)
Securing Cisco Networks with Sourcefire FireAMP Endpoints 3.0 (SSFAMP)
Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS)
Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
Securing Cisco Networks with Open Source Snort (SSFSNORT)

EC-Council

Security
Certified Chief Information Security Officer (CCISO)
Certified Ethical Hacker + Exam (CEH)
Computer Hacking Forensics Investigator (CHFI)
EC-Council Certified Network Defender + Examen (CND)
EC-council Certified Encryption Specialist (ECES)
EC-Council Certified Incident Handler (ECIH)
EC-Council Certified Security Analyst-Licensed Penetration Tester (ECSA-LPT)
EC-Council Ceritified Secure Programmer.net (ECSP)
EC Council Certified Voice Professional (ECVP)
EC Council Disaster Recovery Professional (EDRP)

Global Knowledge

Security
Security project (GKSEC)

Hewlett Packard

Security
Configuring and Deploying HPE VPN Firewalls (H3K71S)

IAPP

Security
Certified Information Privacy Manager (CIPM)
Certified Information Privacy Professional Europe (CIPP/EU) (CIPPE)
Certified Information Privacy Professional and Manager prep course (CIPPE-CIPM)
Certfied Information Privacy Professional and Technologist prep course (CIPPE-CIPT)
Certified Information Privacy Technologist (CIPT-IAPP)

IBM

Cloud & Smarter Infrastructure
IBM Monitoring 8.1.1 Implementation and Administration (TM065G)
Application Performance Management 8.1.1 - APM and Application Diagnostics Fundamentals (TM670G)
Info Mgmt
IBM Network Protection Advanced Topics (IS680G)
IBM Security zSecure UNIX System Services (USS) Security Overview (TK223G)
IBM Security zSecure RACF Management Workshop (TK253G)
IBM AppScan Enterprise Foundations (TK301G)
IBM Access Manager Federated Single Sign-on (TW066G)
IBM Security Directory Suite Foundations (TW070G)
IBM Identity Manager Foundations (TW254G)
Security Systems
IBM Security QRadar SIEM Foundations (BQ102G)
IBM Security QRadar SIEM 7.2 Administration and Configuration (BQ121G)
IBM Security QRadar SIEM Administration (BQ150G)
IBM Security QRadar Incident Forensics Configuration and Usage (BQ161G)
Security Intelligence Fundamentals (BQ600G)
IBM Security SiteProtector System: Basic Implementation and Administration (IS604G)
IBM Security Network Protection Administration and Configuration (IS671G)
IBM BigFix Platform Foundations (IS720G)
IBM BigFix Content Development (IS730G)
IBM Security zSecure Admin Basic Administration and Reporting (TK263G)
IBM Security zSecure Audit Rule-based Compliance Evaluation and Customization (TK273G)
Web Application Security Fundamentals (TK330G)
IBM Security AppScan Standard Fundamentals (TK401G)
IBM Security Directory Server 6.3.1 System Administration (TW084G)
IBM Tivoli Directory Integrator Administration & Deployment (TW092G)
IBM Security Directory Integrator Administration and Deployment (TW093G)
IBM Security Access Manager for Web (TW106G)
IBM Tivoli Directory Server Advanced Deployment (TW233G)
IBM Tivoli Identity Manager 6.0 Basic Administration (TW253G)
IBM Security Privileged Identity Manager Fundamentals (TW294G)
System Storage
IBM Security zSecure CARLa Auditing and Reporting language (TK232G)
Websphere
Accelerate, Secure, and Integrate with IBM DataPower V7 (WE701G)
XML and Web Services Solutions with IBM DataPower Gateway v7 (WE702G)
REST and Oauth Solutions with IBM DataPower Gateway v7 (WE703G)
Accelerate, Secure and Integrate with IBM DataPower v7.1 (WE711G)
JWS and JWE Support in IBM DataPower V7.2 (WE712G)
Administration of IBM WebSphere DataPower Gateway V7 (WE720G)
IBM Guardium Foundations (8G100G)

ISACA

Security
Certified Information Systems Auditor (CISAU)
Certified Information Security Manager (CISM)
Certified in Risk and Information Systems Control (CRISC)

ISC2

Security
Certified Cloud Security Professional Certification Preparation (CCSP)
CISSP-ISSAP Certification Preparation (CISSP-ISSAP)
CISSP-ISSEP Certification Preparation (CISSP-ISSEP)
CISSP-ISSMP Certification Preparation (CISSP-ISSMP)
CISSP Certification Preparation Bootcamp (GK9840)
Systems Security Certified Practitioner (SSCP)

ITIL & Service Management

Security
ISO 27002 Foundation (including Exam) (ISO27002F)

Juniper

Security
Advanced Junos Security (AJSEC)
Advanced Juniper Networks IPSec VPN Implementations (AJVI)
Attack Prevention with Juniper Networks Firewalls (APJF)
Configuring Juniper Networks firewall/IPsec VPN products (CJFV)
Integrating Juniper Networks Firewall/IPSec VPN Products into High-Performance Networks (IFVH)
Implementing Juniper Networks Secure Analytics (IJSA)
Junos Intrusion Prevention System Functionality (JIPS)
Junos Intermediate Routing (JIR)
JNCIE-SEC Bootcamp (JNCIE-SEC)
Junos for Security Platforms (JSEC)
Junos Space-Security Director (JS-SD)
Junos Unified Threat Management (JUTM)
Network and Security Manager Fundamentals (NSMF)

Microsoft

Windows 10
Implementing and Managing Windows 10 (M20697-1)
Deploying and Managing Windows 10 Using Enterprise Services (M20697-2)
Windows Server 2008
Security Fundamentals (M40367)
Performance Tuning and Optimizing SQL Databases (M10987)
Configuring and Deploying a Private Cloud (M20247)

NETAPP

Security
ONTAP 9.0 Data Protection Administration (DATAPROT9)

Palo Alto Networks

Security
FIREWALL 8.0 Essentials: Configuration and Management (EDU-210) (PAN-EDU-210)
Panorama 8.0: Manage Multiple Firewalls (EDU-221) (PAN-EDU-221)
TRAPS 3.4: Install, Configure and Manage (EDU-281) (PAN-EDU-281)
FIREWALL 8.0: Debug and Troubleshoot (EDU-311) (PAN-EDU-311)

Red Hat

Security
Certificate of Expertise - Enterprise Security: Network Services (EX333)
Red Hat Enterprise Security: Network Services (RHS333)

Security

Security
360 Penetration Testing Course (360PTC)
Masterclass Administering and Configuring Active Directory Federation Services and Claims (ADF)
Masterclass: Managing Active Directory Federation Services for Multiple Organizations (ADS)
Advanced Internet Information Services Management (AIISM)
Masterclass: Advanced Threat Analytics - Implementing and Managing (ATA)
Cybercrime Security Forum 2017 (CYBERCRIME)
System Forensics and Incident Handling (FOR)
Masterclass: Hacking and Securing Windows Infrastructure (HSW)
Workshop: Useful Hacking Techniques for Administrators (HTA)
Information Security Management voor Gemeenten (ISMG)
Lead Auditor training (IRCA certified) (ISO27001LA)
Master Class ISO 27001 implementation (ISO27001MI)
Mobile Security (MOBSEC)
Masterclass Public Key Infrastructure Management (PKI)
Masterclass Secure Coding Techniques (SCT)
Security Awareness Workshop - Bewust zijn van Beveiliging (SECAW)
Master Class Cloud Security (SECCS)
Comptia Security+ (SYO-401) (SEC-PLUS)
Risk Analysis Made Easy (SECRA)
Secure Programming (SECSP)
Securing SQL Server (SSS)
Masterclass Troubleshooting, Monitoring and Tracing Windows Infrastructure (TTW)
Workshop Information Security Management (WISM)
Masterclass: Windows Security and Infrastructure Management (WSI)

Symantec Training

Symantec

Security
Symantec Data Loss Prevention 12.5: Administration (IR0996)
Symantec Endpoint Protection 12.X: Maintain and Troubleshoot (SC1433)
Security
Symantec Client Management Suite 7.5: Administration (AT2998)
Symantec Deployment Solution 7.5: Administration (AT5997)
Symantec Endpoint Protection 14.x: Configure and Protect (SC1412)
Symantec Security Information Manager 4.7 (SC1437)
Symantec Endpoint Protection 12.X: Administration (SC1439)
Symantec Network Access Control 11. (SC1440)
Symantec Ghost Solution Suite 2.5 (SC1479)
Symantec Messaging Gateway 9.X Administration (SC2998)
Symantec App Center 4.1.x Administration (SM0999)
Symantec App Center 4.1.x Installation and Administration (SM1000)
PGP Universal Server 3.2 and PGP Desktop 10.2: Administration (US3000)

Veritas

NetBackup

Security
Symantec NetBackup 7.7: Administration (DP0134)
Security
NetBackup 7.7: Advanced Administration (DP0135)