In this section

Share this page

Security Training courses

securiry header website 569x233

Every organization knows the importance of (cyber) security. Tremendous amounts of data are shared via numerous interfaces and devices. This infinite sharing of information in the 21st century has many benefits; however, it is not nearly as safe as it was 25 years ago.

Since organizations are opening up their IT services to an increasingly wider range of software applications that use all (mobile) devices imaginable, data security in part is dependent on other organizations. What’s more, IT is primarily responsible for ensuring the continuity of the company’s core business processes. A disruption can have a big impact on the availability of services and on the continuity of the company’s operations.

Therefore, security measures are a must in order to prevent problems or incidents of any kind and to keep risks such as identity theft, ransomware, phishing and other damaging cyber-attacks to a minimum.

As a leading training facility in security in Europe, Global Knowledge supports organizations in creating and maintaining a secure IT infrastructure, organization and data security by training and educating employees.

Global Knowledge provides education and training programmes in all areas and levels of security, whether you are looking for cybersecurity, security policy, designing and implementing secure networks, risk analysis, monitoring, troubleshooting or creating security awareness among employees, you will find the security training here that fits your needs.

The three areas of focus for optimum security

Good security consists of more than just technology. A well-defined IT security policy and promoting a culture in which every employee knows his or her responsibilities are just as important. Global Knowledge has mapped out the details of these three areas for optimum security.

Collapse all results


Amazon Web Services

Security Operations on AWS (GK3338)

Check Point

Check Point Security Administrator (CCSA R80) (T-VPN-01)
Check Point Security Expert (CCSE R80) (T-VPN-02)
Checkpoint Security Master (CCSM R77) (T-VPN-03)


CCIE Security - Lab Preparation (CCIESEC)
Cisco CCNA Security Boot Camp (Accelerated) (CCNASECBC)
Implementing Cisco Network Security (IINS)
Cisco Identity Services Engine Update Training (ISE2)
Cisco NGFW Technical Workshop (NGFWTW)
Securing Email with Cisco Email Security Appliance - Channel Partners (PASESA)
Cisco ASA Express Security (SAEXS)
Implementing Advanced Cisco ASA Security v2.1 (SASAA)
Implementing Core Cisco ASA Security (SASAC)
Securing Cisco Networks with Threat Detection and Analysis (SCYBER)
Understanding Cisco Cybersecurity Fundamentals (SECFND)
Implementing Cisco Cybersecurity Operations (SECOPS)
Implementing Cisco Edge Network Security Solutions (SENSS)
Securing Email with Cisco Email Security Appliance (SESA)
Implementing Cisco Secure Mobility (SIMOS)
Implementing Cisco Secure Access Solutions (SISAS)
Implementing and Configuring Cisco Identity Services Engine (SISE)
Implementing Cisco Threat Control Systems (SITCS)
Managing Enterprise Security with Cisco Security Manager (SSECMGT)
Implementing Cisco Identity Services Engine for Wireless Engineers (SWISE)
Securing the Web with Cisco web Security Appliance (SWSA)

Cisco Advanced Services (HTDLS)

Securing Networks with Firepower Threat Defense NGFW (FIREPOWER200)
Implementing an Integrated Threat Defebse Solution (SECUR201)
Securing Cisco Networks with Sourcefire FireAMP Endpoints 4.0 (SSFAMP)
Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS)
Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)
Securing Cisco Networks with Open Source Snort (SSFSNORT)


Citrix Enterprise Security Solutions (CTX-270)
Securing Citrix Networking and Mobility Solutions (CTX-271)
Citrix Enterprise Security Solutions (CTX-270)
Securing Citrix Networking and Mobility Solutions (CTX-271)
Securing Citrix Virtualisation Solutions (CTX-272)
Citrix Enterprise Security Solutions (CTX-270)
Securing Citrix Virtualisation Solutions (CTX-272)


Cybersecurity Foundations (9701)
Certified Chief Information Security Officer (CCISO)
Certified Ethical Hacker + Exam (CEH)
Computer Hacking Forensics Investigator + Exam (CHFI)
EC-Council Certified Network Defender + Examen (CND)
EC-council Certified Encryption Specialist (ECES)
EC-Council Certified Incident Handler (ECIH)
EC-Council Certified Security Analyst V9 + exam (ECSA-LPT)
EC-Council Ceritified Secure (ECSP)
EC Council Certified Voice Professional (ECVP)
EC Council Disaster Recovery Professional v3 (EDRP)

Hewlett Packard

HP ArcSight ESM 6.5 Security Administrator and Analyst (00924200)
Configuring and Deploying HPE VPN Firewalls (H3K71S)


Certified Information Privacy Manager (CIPM)
Certified Information Privacy Professional Europe (CIPP/EU) + Exam (CIPPE)
Certified Information Privacy Professional and Manager prep course + Exam (CIPPE-CIPM)
Certfied Information Privacy Professional and Technologist prep course + Exam (CIPPE-CIPT)
Certified Information Privacy Technologist + Exam (CIPT-IAPP)


Cloud & Smarter Infrastructure
IBM Monitoring 8.1.1 Implementation and Administration (TM065G)
Application Performance Management 8.1.1 - APM and Application Diagnostics Fundamentals (TM670G)
Info Mgmt
IBM Network Protection Advanced Topics (IS680G)
IBM Security zSecure UNIX System Services (USS) Security Overview (TK223G)
IBM Security zSecure RACF Management Workshop (TK253G)
IBM AppScan Enterprise Foundations (TK301G)
IBM Access Manager Federated Single Sign-on (TW066G)
IBM Security Directory Suite Foundations (TW070G)
IBM Identity Manager Foundations (TW254G)
Security Systems
IBM Security QRadar SIEM Foundations (BQ102G)
IBM Security QRadar SIEM Advanced Topics (BQ132G)
IBM Security QRadar SIEM Administration (BQ150G)
IBM Security QRadar Incident Forensics Configuration and Usage (BQ161G)
Security Intelligence Fundamentals (BQ600G)
IBM Security SiteProtector System: Basic Implementation and Administration (IS604G)
IBM Security Network Protection Administration and Configuration (IS671G)
IBM BigFix Platform Foundations (IS720G)
IBM BigFix Content Development (IS730G)
IBM Security zSecure RACF and SMF Auditing (TK243G)
IBM Security zSecure Admin Basic Administration and Reporting (TK263G)
IBM Security zSecure Audit Rule-based Compliance Evaluation and Customization (TK273G)
IBM Security AppScan Standard Fundamentals (TK401G)
IBM Security Directory Integrator Administration and Deployment (TW093G)
IBM Identity Governance and Intelligence Foundations (TW400G)
System Storage
IBM Security zSecure CARLa Auditing and Reporting language (TK232G)
XML and Web Services Solutions with IBM DataPower Gateway v7 (WE702G)
REST and Oauth Solutions with IBM DataPower Gateway v7 (WE703G)
Accelerate, Secure and Integrate with IBM DataPower v7.1 (WE711G)
JWS and JWE Support in IBM DataPower V7.2 (WE712G)
Administration of IBM WebSphere DataPower Gateway V7 (WE720G)
IBM Guardium Foundations (8G100G)
IBM QRadar SIEM Foundations (BQ103G)
IBM Directory Server 6.4 Fundamentals (TW085G)
IBM Access Manager Platform Foundations (TW107G)


Certified Information Systems Auditor (CISAU)
Certified Information Security Manager (CISM)
Certified in Risk and Information Systems Control (CRISC)


Certified Cloud Security Professional Certification Preparation (CCSP)
CISSP-ISSAP Certification Preparation (CISSP-ISSAP)
CISSP-ISSEP Certification Preparation (CISSP-ISSEP)
CISSP-ISSMP Certification Preparation (CISSP-ISSMP)
CISSP Certification Preparation Bootcamp (GK9840)
Systems Security Certified Practitioner (SSCP)

ITIL & Service Management

ISO 27002 Foundation (including Exam) (ISO27002F)


Advanced Junos Security (AJSEC)
Advanced Juniper Networks IPSec VPN Implementations (AJVI)
Attack Prevention with Juniper Networks Firewalls (APJF)
Configuring Juniper Networks firewall/IPsec VPN products (CJFV)
Integrating Juniper Networks Firewall/IPSec VPN Products into High-Performance Networks (IFVH)
Implementing Juniper Networks Secure Analytics (IJSA)
Junos Intermediate Routing (JIR)
Junos for Security Platforms (JSEC)
Junos Space-Security Director (JS-SD)
Network and Security Manager Fundamentals (NSMF)


Windows 10
Implementing and Managing Windows 10 (M20697-1)
Deploying and Managing Windows 10 Using Enterprise Services (M20697-2)
Windows Server 2008
Security Fundamentals (M40367)
Windows Server 2016
Identity with Windows Server 2016 - Blended (M20742-B)
Performance Tuning and Optimizing SQL Databases (M10987)


ONTAP 9.0 Data Protection Administration (DATAPROT9)

Palo Alto Networks

FIREWALL 8.0 Essentials: Configuration and Management (EDU-210) (PAN-EDU-210)
Panorama 8.0: Manage Multiple Firewalls (EDU-221) (PAN-EDU-221)
TRAPS 3.4: Install, Configure and Manage (EDU-281) (PAN-EDU-281)
FIREWALL 8.0: Debug and Troubleshoot (EDU-311) (PAN-EDU-311)

Red Hat

Certificate of Expertise - Enterprise Security: Network Services (EX333)
Red Hat Enterprise Security: Network Services (RHS333)
RHS333-Bundle: Red Hat Enterprise Security: Network Services + EX333 (RHS334)


360 Penetration Testing Course (360PTC)
Masterclass Administering and Configuring Active Directory Federation Services and Claims (ADF)
Masterclass: Managing Active Directory Federation Services for Multiple Organizations (ADS)
Advanced Internet Information Services Management (AIISM)
Masterclass: Advanced Threat Analytics - Implementing and Managing (ATA)
Cybercrime Security Sessions 2018 (CYBERCRIME)
System Forensics and Incident Handling (FOR)
Masterclass: Hacking and Securing Windows Infrastructure (HSW)
Workshop: Useful Hacking Techniques for Administrators (HTA)
Information Security Management voor Gemeenten (ISMG)
Lead Auditor training (IRCA certified) (ISO27001LA)
Master Class ISO 27001 implementation (ISO27001MI)
Mobile Security (MOBSEC)
Masterclass Public Key Infrastructure Management (PKI)
Masterclass Secure Coding Techniques (SCT)
Security Awareness Workshop - Bewust zijn van Beveiliging (SECAW)
Master Class Cloud Security (SECCS)
Comptia Security+ (SYO-401) (SEC-PLUS)
Risk Analysis Made Easy (SECRA)
Secure Programming (SECSP)
Securing SQL Server (SSS)
Masterclass Troubleshooting, Monitoring and Tracing Windows Infrastructure (TTW)
Workshop Information Security Management (WISM)
Masterclass: Windows Security and Infrastructure Management (WSI)

Symantec Training

Endpoint and Hybrid Cloud Security

Symantec Endpoint Protection 14.x: Configure and Protect (SC1412)
Symantec Endpoint Protection 12.X: Maintain and Troubleshoot (SC1433)
Symantec Endpoint Protection 12.X: Administration (SC1439)

Information Protection

PGP Universal Server 3.2 and PGP Desktop 10.2: Administration (US3000)


Symantec Data Loss Prevention 12.5: Administration (IR0996)
Symantec Endpoint Protection 12.X: Maintain and Troubleshoot (SC1433)
Symantec Client Management Suite 7.5: Administration (AT2998)
Symantec Deployment Solution 7.5: Administration (AT5997)
Symantec Security Information Manager 4.7 (SC1437)
Symantec Network Access Control 11. (SC1440)
Symantec Ghost Solution Suite 2.5 (SC1479)
Symantec Messaging Gateway 9.X Administration (SC2998)
Symantec App Center 4.1.x Administration (SM0999)
Symantec App Center 4.1.x Installation and Administration (SM1000)



Symantec NetBackup 7.7: Administration (DP0134)
NetBackup 7.7: Advanced Administration (DP0135)