K Labs pone a tu disposición a sus Formadores Certificados, Laboratorios Didácticos, Simuladores de Examen, y un Test Center con un Tutor dedicado a ti en la preparación del examen.

 

Gracias a nuestro apoyo, el porcentaje de candidatos que obtienen la certificación en el primer intento está cerca al 100%.

fabio-oyxis2kalvg-unsplash (1).jpeg
cybersecurity-deltalyz-1.jpeg
939869167014516ec34430a26728e18e 2
logo k labs nuovo-white

Mantente informado sobre las novedades formativas.

¡Subscríbete!

Déjanos tu correo

Mantente informado sobre las novedades formativas.

¡Subscríbete!

Déjanos tu correo

CYBERSECURITY

logo k labs nuovo-white
image

Participando en un curso de esta categoría y superando el test de valoración de las competencias, obtendrás el Badge Digital CERTIFIED ENGINEER  "Cybersecurity" que podrás compartir en tus redes sociales. 

K Labs Srl

Tel. +39 059 8212 29 | info@klabs.it

CIF IT02034520367

PRIVACY Y COOKIE

©2024 K LABS Srl - TODOS LOS DERECHOS RESERVADOS


linkedin

©2024 K LABS Srl - TODOS LOS DERECHOS RESERVADOS

PRIVACY Y COOKIE


linkedin

SÍGANOS

SÍGANOS

Cybersecurity Awareness

Code: KLA-CYBSAW

Duration: 1 day

Level: Non-technical Skills

Main Category

     CYBERSEC

 

security.jpeg

COURSE DESCRIPTION

This training will cover essential online safety best practices. Attending the course
you will be able to learn key actual topics like protection from phishing, malware
and general safe internet habits: it is ideal for individuals and organizations seeking
to improve their digital security awareness.

Cybersecurity Fundamentals

Code: KLA-CYBSFUN

Duration: 1 day

Level: Basic

Main Category

CYBERSEC

 

adobestock_245143037.jpeg

COURSE DESCRIPTION

This training will cover the basics of cybersecurity, including the risks related
to security and the concepts needed to recognize and mitigate attacks against
enterprise networks and mission-critical infrastructure. During the training different
types of attacks and the related defense mechanisms will introduced and
explained. It is essential for understanding the security landscape and how to
protect businesses from negative impact of cyberattacks.

Network Security and Firewalling

Code: KLA-NSFIREW

Duration: 3 days

Level: Basic

Main Category 

     CYBERSEC

Related categories

     NETWORKING

adobestock_647105727.jpeg

COURSE DESCRIPTION

This training will cover the basics of network security and firewalls, including Next
Generation Firewall functions, how to configure them, and how to use them to
protect networks. The course delves into foundational knowledge of stateful filtering,
security objects, security policies, NAT, Application Control and L7 Content
Security. Through demonstrations and hands-on labs, students will gain experience
in configuring and managing NGFW.

VPN and Secure Remote Access

Code: KLA-VPNSRA

Duration: 2 days

Level: Intermediate

Main Category 

     CYBERSEC

Related categories

     NETWORKING

adobestock_206769563.jpeg

COURSE DESCRIPTION

This training will cover the basics of VPNs technology, explaining the most common
security protocols, and their implementation to secure remote access. Learn
how to use and configure VPNs for different scenarios like Site-to-Site IPsec
VPN, SSL VPN for client access and have an introduction to new technologies
like SD-WAN or SASE. It is essential for understanding how to allow remote users
to securely access enterprise resources, on-premises or in cloud.

Security Monitoring, SIEM and SOAR

Code: KLA-SIEMSOAR

Duration: 2 days

Level: Intermediate

Main Category 

     CYBERSEC

Related categories

     NETWORKING

adobestock_332234118 (siemsoar).jpeg

COURSE DESCRIPTION

This training will cover how to perform security monitoring in an organization.
The most common tools for centralized threat detection will be introduced, like
the SIEM (Security Information and Event Management) systems that are commonly
used in a SOC (Security Operation Center) along with SOAR (Security
Orchestration Automation and Response). Learn practical skills in configuring
and managing SIEM and SOAR solutions to effectively detect, monitor, analyze,
and respond to security incidents.

Endpoint Cybersecurity and Management

Code: KLA-CYBSENDP

Duration: 2 days

Level: Intermediate

Main Category 

     CYBERSEC

Related categories

     NETWORKING

cybersecurity

COURSE DESCRIPTION

This training will cover modern Endpoint Protection Solutions. In this course, you
will discover the different approaches available to achieve endpoint security in
the era of remote working, including device threat detection, response strategies,
and centralized management of company devices. It is essential for understanding
how to protect endpoints and business resources from attacks, following the
Zero Trust security approach.

Web Application Firewall (WAF), Features and Functions

binario.jpeg

Code: KLA-WAFF

Duration: 2 days

Level: Intermediate

Main Category 

     CYBERSEC

Related categories

     NETWORKING

COURSE DESCRIPTION

This training will cover the features and functions of today’s Web Application Firewall
solutions. The network topologies and the specific functions of application
layer firewall are analyzed. The course includes lab sessions on real equipment,
in order to better understand the topics and acquire skills of analysis and troubleshooting.

Implementing IPv6 Security

ipv6s - fotolia_56073990_s.jpeg

Code: KLA-IPV6SEC

Duration: 1 day

Level: Intermediate

Main Category 

     CYBERSEC

Related categories

     NETWORKING

COURSE DESCRIPTION

This training will cover the security aspects needed to consider when implementing
IPv6. The different structure and usage of the IPv6 will be explained, along
with the best practices about the design and the technology in order to provide
encryption and privacy to the users.

Introduction to Quantum Security using QKD

Code: KLA-IQUASEC

Duration: 2 days

Level: Basic

Main Category 

     CYBERSEC

 

adobestock_215123311.jpeg

COURSE DESCRIPTION

This introductory training will cover the fundamentals of quantum technology
applied to the cryptography. The course will be focused on the perspectives of
Quantum Key Distribution (QKD), where the security of communication relies on
the fundamental properties of quantum states of light and introducing its potential
in response to the threats that quantum computers can introduce against current
cryptography techniques. In this course, you will learn how the cybersecurity risk
landscape is evolving as well as explore future approaches using QKD security

Ethical Hacking and Penetration Testing

Code: KLA-ETHACK

Duration: 4 days

Level: Advanced

Main Category 

     CYBERSEC

Related categories

     NETWORKING

adobestock_338003330.jpeg

COURSE DESCRIPTION

This training will cover the techniques of ethical hacking and its usage to perform
vulnerability assessment and penetration testing. The course will explain
the steps to identify, test and exploit common vulnerabilities in web applications,
networks, and devices. You will gain hands-on experience in using various penetration
testing tools, preparing reports, and begin the path to become an ethical
hacker.

Secure Coding

Authentication and Encryption Technologies

adobestock_336352813(autencr).jpeg

Code: KLA-AUTENCR

Duration: 2 days

Level: Advanced

Main Category 

    CYBERSEC

 

COURSE DESCRIPTION

This training delves into the authentication and encryption technologies, providing
a comprehensive understanding of the essential security measures. From
hashing algorithms to digital certificates and public key infrastructure (PKI), you
will gain the knowledge and skills to protect your data effectively in transit and
at rest. The most common mechanism of authentication for users and devices /
application will be explained with examples. Multifactor Authentication and SAML
(Security Assertion Markup Language) will be explained as well.

Cloud Security Design

Code: KLA-CLOSEC

Duration: 2 days

Level: Advanced

Main Category

     CLOUD

Related Categories

     CYBERSEC

cloud security_adobestock_574743730.jpeg

COURSE DESCRIPTION

Immerse yourself in the cutting-edge realm of Cloud Security Design with this
comprehensive course. Delve into the intricacies of securing cloud architectures,
mastering robust strategies for risk mitigation and compliance. From identity and
access management to encryption and threat detection, learn to fortify your cloud
infrastructure against evolving cyber threats. Acquire practical skills to design
secure, resilient cloud environments, making this course essential for those committed
to safeguarding sensitive data in the dynamic landscape of cloud computing.

Securing Spring Boot Applications

COURSE DESCRIPTION

Empower Java applications with robust security features. This specialized program
is crafted for Java developers looking to implement comprehensive security
in Spring Boot applications. Learn the essentials of Spring Security, from
basic authentication and authorization to advanced OAuth2 and JWT. We cover
a range of security practices, including securing REST APIs, user roles and
permissions, and CSRF protection. Through hands-on examples, you will tailor
Spring Security to your specific application needs, ensuring data integrity and
user safety.

Code: KLA-SPBSEC

Duration: 2 days

Level: Advanced

Main Category

CODING

Related Categories

CYBERSEC

software1.jpeg

Secure Coding

COURSE DESCRIPTION

This course focuses on secure coding best practices deepening the principles
of secure programming and designing. It explores how to manage Authentication
and Authorization flows and learn threat modeling and the most common
software vulnerabilities. The course also explains the concept of observability:
overview of logging, monitoring, tracing and why they are fundamental for safety.
You will learn about data management by exploring techniques to manage data
securely, including encryption, backup and deletion procedures.

secod

Code: KLA-SECOD

Duration: 2 days

Level: Advanced

Main Category

     CODING

Related Categories

     CYBERSEC