cybersecurity
education
€ EUR
  • $ USD
  • € EUR

CQURE Courses

  • Class

  • Skill Levels

  • Format

CyberBytes: Analysis of the Points of Entry to Your Infrastructure Level Hard
In just 2 hours, you’ll dive deep into analysing entry points in the infrastructure and discover the techniques attackers use to obtain enough information for a successful phishing attack.
CyberBytes: Effective Implementation of the Application Whitelisting
In just two hours, you’ll learn two effective strategies to implement application whitelisting.
CyberBytes: Infrastructure Pentesting: Hackers Perspective or Notes from the Field
In less than three hours, this training based on real-world scenarios will equip you with the skills and know-how to conduct effective pentest and vulnerability management.
CyberBytes: Microsoft SQL Server Security
In just 2 hours, you’ll discover how to extract data from memory dumps and develop the advanced digital forensic skills you need to investigate stealthy cyberattacks.
CyberBytes: Updated Security Features in Windows Server 2019
CyberBytes Updated Security Features in Windows Server 2019
CyberBytes: Machine learning for cybersecurity
We’re going to show you how to implement security solutions using machine learning techniques so you can detect, investigate, and respond to advanced attacks and data breaches faster.
CyberBytes: Analysis of the Points of Entry to Your Infrastructure Level Hard

In just 2 hours, you’ll dive deep into analysing entry points in the infrastructure and discover the techniques attackers use to obtain enough information for a successful phishing attack.

CyberBytes: Analysis of the Points of Entry to Your Infrastructure Level Hard

In just 2 hours, you’ll dive deep into analysing entry points in the infrastructure and discover the techniques attackers use to obtain enough information for a successful phishing attack.

CyberBytes: Effective Implementation of the Application Whitelisting

In just two hours, you’ll learn two effective strategies to implement application whitelisting.

CyberBytes: Effective Implementation of the Application Whitelisting

In just two hours, you’ll learn two effective strategies to implement application whitelisting.

CyberBytes: Infrastructure Pentesting: Hackers Perspective or Notes from the Field

In less than three hours, this training based on real-world scenarios will equip you with the skills and know-how to conduct effective pentest and vulnerability management.

CyberBytes: Infrastructure Pentesting: Hackers Perspective or Notes from the Field

In less than three hours, this training based on real-world scenarios will equip you with the skills and know-how to conduct effective pentest and vulnerability management.

CyberBytes: Microsoft SQL Server Security

In just 2 hours, you’ll discover how to extract data from memory dumps and develop the advanced digital forensic skills you need to investigate stealthy cyberattacks.

CyberBytes: Microsoft SQL Server Security

In just 2 hours, you’ll discover how to extract data from memory dumps and develop the advanced digital forensic skills you need to investigate stealthy cyberattacks.

CyberBytes: Updated Security Features in Windows Server 2019

CyberBytes
Updated Security Features in Windows Server 2019

CyberBytes: Updated Security Features in Windows Server 2019

CyberBytes
Updated Security Features in Windows Server 2019

CyberBytes: Machine learning for cybersecurity

We’re going to show you how to implement security solutions using machine learning techniques so you can detect, investigate, and respond to advanced attacks and data breaches faster.

CyberBytes: Machine learning for cybersecurity

We’re going to show you how to implement security solutions using machine learning techniques so you can detect, investigate, and respond to advanced attacks and data breaches faster.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form