fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR

CQURE Courses

  • Class

  • Skill Levels

  • Format

CMAP 2024 | Bonus Module 14: Cyber Threat Intelligence
CMAP24 Bonus Module 14: Cyber Threat Intelligence
CMAP 2024 | Module 13: Building Secure Cluster Infrastructure in the Cloud
CMAP24 Module 13: Building Secure Cluster Infrastructure in the Cloud
Configuring Application Whitelisting
Join 8-hour Course: Configuring Application Whitelisting with Sami Laiho, Windows OS Expert, Microsoft MVP
Pentesting Web Applications
Join 8-hour Course: Pentesting Web Applications with Artur Kalinowski, Cybersecurity Expert
CyberBytes: Advanced Monitoring and Auditing of Windows 2019 Infrastructure
Focus on teaching you how to plan your monitoring on enterprise level and how to implement it in a way, that will provide you with all the information you need and monitor everything you need.
CyberBytes: Machine learning for cybersecurity
We’re going to show you how to implement security solutions using machine learning techniques so you can detect, investigate, and respond to advanced attacks and data breaches faster.
CyberBytes: Updated Security Features in Windows Server 2019
CyberBytes Updated Security Features in Windows Server 2019
CyberBytes: Infrastructure Pentesting: Hackers Perspective or Notes from the Field
In less than three hours, this training based on real-world scenarios will equip you with the skills and know-how to conduct effective pentest and vulnerability management.
CMAP 2024 | Bonus Module 14: Cyber Threat Intelligence

CMAP24
Bonus Module 14: Cyber Threat Intelligence

CMAP 2024 | Bonus Module 14: Cyber Threat Intelligence

CMAP24
Bonus Module 14: Cyber Threat Intelligence

CMAP 2024 | Module 13: Building Secure Cluster Infrastructure in the Cloud

CMAP24
Module 13: Building Secure Cluster Infrastructure in the Cloud

CMAP 2024 | Module 13: Building Secure Cluster Infrastructure in the Cloud

CMAP24
Module 13: Building Secure Cluster Infrastructure in the Cloud

Configuring Application Whitelisting

Join 8-hour Course: Configuring Application Whitelisting with Sami Laiho, Windows OS Expert, Microsoft MVP

Configuring Application Whitelisting

Join 8-hour Course: Configuring Application Whitelisting with Sami Laiho, Windows OS Expert, Microsoft MVP

Pentesting Web Applications

Join 8-hour Course: Pentesting Web Applications with Artur Kalinowski, Cybersecurity Expert

Pentesting Web Applications

Join 8-hour Course: Pentesting Web Applications with Artur Kalinowski, Cybersecurity Expert

CyberBytes: Advanced Monitoring and Auditing of Windows 2019 Infrastructure

Focus on teaching you how to plan your monitoring on enterprise level and how to implement it in a way, that will provide you with all the information you need and monitor everything you need.

CyberBytes: Advanced Monitoring and Auditing of Windows 2019 Infrastructure

Focus on teaching you how to plan your monitoring on enterprise level and how to implement it in a way, that will provide you with all the information you need and monitor everything you need.

CyberBytes: Machine learning for cybersecurity

We’re going to show you how to implement security solutions using machine learning techniques so you can detect, investigate, and respond to advanced attacks and data breaches faster.

CyberBytes: Machine learning for cybersecurity

We’re going to show you how to implement security solutions using machine learning techniques so you can detect, investigate, and respond to advanced attacks and data breaches faster.

CyberBytes: Updated Security Features in Windows Server 2019

CyberBytes
Updated Security Features in Windows Server 2019

CyberBytes: Updated Security Features in Windows Server 2019

CyberBytes
Updated Security Features in Windows Server 2019

CyberBytes: Infrastructure Pentesting: Hackers Perspective or Notes from the Field

In less than three hours, this training based on real-world scenarios will equip you with the skills and know-how to conduct effective pentest and vulnerability management.

CyberBytes: Infrastructure Pentesting: Hackers Perspective or Notes from the Field

In less than three hours, this training based on real-world scenarios will equip you with the skills and know-how to conduct effective pentest and vulnerability management.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form