Learn how to secure your legacy, cloud and virtualized infrastructure
Cyber incidents become more and more complex. Securing the use of Internet for communication and business starts with understanding known threats and security techniques, following the C-I-A triad philosophy: confidentiality, integrity and availability.
In this three-day course you learn the fundamentals of a secure virtualized enterprise infrastructure. We start from scratch and learn about essential threats, attacks and defences. Theory is illustrated with numerous demos of current security technologies and products.