Posts Tagged "security"
Computing Concepts Series: Security Risks 1 - Day(s)
VMware vSphere 4: Manage and Design for Security 3 - Day(s)
This course shows you how to follow best practices for secure design, deployment, and operation of a VMware vSphere environment. Through lecture, discussion, and hands-on practice, you will gain the knowledge and skills necessary to meet the security and compliance goals of your organization.
Read More Offer RequestImplementing Active Directory Federation Services 2.0 4 - Day(s)
This four-day instructor-ledcourse provides students with the knowledge and skills to install and configure Active Directory Federation Services 2.0 (AD FS). The course focuses on terminology, user interfaces, and common configuration scenarios for AD FS.
Read More Offer RequestImplementing Forefront Protection 2010 for Exchange and SharePoint 1 - Day(s)
This one-day instructor-led course provides students with the knowledge and skills to envision, design, and deploy security solutions based on the Microsoft Forefront suite that protect organizations using Microsoft Exchange Server and Microsoft SharePoint Server, enabling them to identify the requirements and make the appropriate design decisions that will come up during the deployment process, and providing hands-on experience with the products.
Read More Offer RequestImplementing Forefront Identity Manager 2010 4 - Day(s)
This four-day instructor-led course introduces and explains the features and capabilities of Microsoft Forefront Identity Manager 2010 (FIM), and provides an overview of the solution scenarios that FIM addresses. The course format includes presentation, discussion, demonstration, and many hands-on exercises. It is intended for students who have no previous Forefront Identity Manager 2010 or Microsoft Identity Lifecycle Manager 2007 (ILM) experience.
Read More Offer RequestDeploying & Administering Microsoft Forefront Security For Exchange Server, SharePoint & Security Management Console 2 - Day(s)
This course provides students with the knowledge and skills to deploy and administer Microsoft Forefront Server Security products. This class includes lecture and hands-on labs (covering several server products) and was developed by Microsoft Consulting Services using their detailed implementation knowledge and best practices.
On completion of this M50094 training course, delegates should be able to:
- Describe aspects of the multiple engine settings and the balance of information versus performance in Forefront Security for Exchange Server
- Discuss how transport scanning works in Forefront Security for Exchange Server
- Identify and understand the differences between default mode and outbreak mode protection, and understand the file, content, and keyword filtering options available with Forefront Security for Exchange Server
- Identify components and services within Forefront Security for SharePoint
- Use Forefront Security for SharePoint filters and templates to define scanning options
- Understand Forefront Security for SharePoint diagnostics, logging, and statistics gathered during maintenance and from notifications
- Understand the various alerts and reporting features available in Forefront Server Security Management Console
- Identify the eight Management Console job categories and the basic role of each classification
Ethical Hacker 5 - Day(s)
This program prepares individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. An Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
Read More Offer RequestUNIX and Linux Security 4 - Day(s)
The UNIX family of operating systems, including the Linux versions, is prized by IT professionals for its flexibility and openness. However, vulnerabilities can make UNIX systems susceptible to information assurance threats. In this course, you gain the skills needed to secure your UNIX and Linux platforms.
Read More Offer RequestSecuring Web Applications, Services and Servers 4 - Day(s)
Cybersecurity is a serious challenge today as attackers specifically target Web application vulnerabilities. These vulnerabilities can be exploited to obtain confidential information and compromise organizational integrity.
Read More Offer RequestSubscribe newsletter ?
Our Trainings
- All trainings (714)
- New media (25)
- Training DB Administration (4)
- Training DB users (2)
- Training Development (122)
- Training MS Office (259)
- Training OS (102)
- Training PAO (40)
- Training Programming (147)
- Training Server administration (5)
- Training Webdesign (59)
- news (4)
- Non classé (1)


