English Courses

We found 31 courses available for you
See
-36%

CCNP Security Training Course in Delhi | CCNP Security Course

40 hours
Intermediate

Best CCNP Security 350-701 Training in Delhi Bestseller 4.6  …

What you'll learn
Deploying Cisco IOS Software Site to Site Transmission Security.
FIREWALL ( Deploying Cisco ASA Firewall Solutions).
Deploying Cisco IOS Software Threat Control and Containment.
-29%

CCNA Voice Course Training In Delhi

60 hours
Intermediate

Latest Student Review Google Review(1120)  5/5 Name Testimonial Review …

What you'll learn
Voice Mail and Presence Solution.
Cisco Unified Communications Manager Express.
Voice Network Management and Trouble Shooting.
-29%

CISM Certification Training Course in Delhi

40 hours
Intermediate

CISM Certification Training Course | Certified Information Security Manager Bestseller …

What you'll learn
Information Security Governance
Incident Management in information Security
Designing security architecture
Knowledge of ISACA domains
How Information security programs function
Types of Enterprise IT frameworks
-80%

Online AWS Training in Delhi | Amazon Web Service Security Training

60 hours
Intermediate

The Security Engineering on AWS Training In Delhi …

What you'll learn
How to build AWS application infrastructures to protect against security threats
<strong>AWS Training In Delhi </strong> shared security responsibility model
How to protect data at rest and in transit using encryption techniques
Applying security checks to conduct an automated and reproducible infrastructure
How to identify and mitigate threats for Apps and Data
How to configure the authentication process for resources and applications in the AWS Cloud
How to perform security assessment tests for making sure that simple vulnerabilities are resolved
Learn All about <strong>AWS Training In Delhi </strong>

Red Hat Open Stack Certified Architect in Delhi

40 hours
Intermediate

Red Hat Certified Architect | Red Hat Open Stack Bestseller …

What you'll learn
Red Hat OpenStack (EX210 and EX310)
Red Hat Certified Specialist in Virtualization (RHCVA, EX318)
Red Hat Certified Specialist in High Availability Clustering (RH436)
Red Hat Certified Specialist in OpenShift Administration (EX280)
Red Hat Certified Specialist in Containers and Kubernetes (EX180)
-32%

International Organization for Standardization (ISO) 27001 Lead Auditor Training

40 hours
Intermediate

International Organization for Standardization (ISO) 27001 Lead Auditor Training The …

What you'll learn
Review the Audit Requirements of ISO/IEC 27001
Learn Auditing Principles applicable ISO 27001 Auditing
Learn How to Assess Security Threats and Vulnerabilities
Understand Review Requirements of Security Controls and Countermeasures
Understand the Roles and Responsibilities of the Auditor
Learn How to Plan, Execute, Report, and Follow-up on an Information Security Management System Audit
-24%

EC-Council Certified Incident Handler (ECIH) V2 Course

40 hours
Intermediate

EC-Council Certified Incident Handler (ECIH) V2 Course Bestseller 4.6  …

What you'll learn
To enable individuals and organizations with the ability to handle and respond to different types of cybersecurity incidents in a systematic way.
To ensure that organization can identify, contain, and recover from an attack.
To reinstate regular operations of the organization as early as possible and mitigate the negative impact on the business operations.
To be able to draft security policies with efficacy and ensure that the quality of services is maintained at the agreed levels.
To minimize the loss and after-effects breach of the incident.
For individuals: To enhance skills on incident handling and boost their employability.
-17%

HP ArcSight ESM Training Certification

60 hours
Intermediate

HP ArcSight ESM Our Course Advisor Requirements Basic IT Skills …

What you'll learn
Common security devices, such as IDS & firewalls
Common network device functions, such as routers, switches, hubs, etc.
TCP/IP functions, such as CIDR blocks, subnets, addressing, communications, etc.
Basic Windows operating system tasks & functions
Possible attack activities, such as scans, a man in the middle, sniffing, DoS, etc., and possible abnormal activities, such as worms, Trojans, viruses, etc.
SIEM terminology, such as threat, vulnerability, risk, asset, exposure, safeguards, etc.
6 months experience administering HP ArcSight ESM
Completed HP ArcSight ESM Administrator
Enroll Now!













Craw Cyber Security Private Limited