ANT0011
The material of this course will allow listeners to study technologies, specific mechanisms, and their application to prevent, detect, and respond to cyber security threats by filtering network traffic.
I'm interested →ANT0012
The material of the course will allow listeners to study technologies, specific mechanisms and their application for network infrastructure cyber security from the perspective of the Zero-Trust concept used in building corporate cybersecurity architecture.
I'm interested →ANT0013
The material of the course will allow listeners to study technologies, specific mechanisms and methods of their application to protect corporate cyber security from DoS and DDoS attacks.
I'm interested →ANT0101
The material of this course will allow listeners to study how different technologies, mechanisms and methods of building Virtual Private Network (VPN) work, as well as to learn to embed VPN networks in architecture of corporate cyber security.
I'm interested →ANT0102
The material of this course will allow listeners to study operation of various technologies, mechanisms and methods of building secure Wi-Fi networks.
I'm interested →ANT0103
The material of this course will allow listeners to study the operation of access control mechanisms compliant with the IEEE 802.1x standard, and learn to design and deploy the appropriate infrastructure to implement these access control mechanisms.
I'm interested →ANT1001
The material of this course will allow listeners to study the technologies and mechanisms of operation of Sandboxes and Honeypots. The material of the course covers not only theoretical but also methodological aspects of Sandboxes and Honeypots usage: their integration into the overall architecture and processes of corporate cyber security.
I'm interested →ANT1002
The material of this course will allow listeners to study the technologies and mechanisms of operation of Public Key Infrastructure. The material of the course covers not only theoretical but also practical aspects of PKI deployment: design within the frame of corporate cyber security architecture, management of cryptographic keys and digital certificates, monitoring and ensuring the security of PKI infrastructure.
I'm interested →ANT-N101
The material of this course will allow listeners to study the operation of modern data networks based on the TCP/IP protocol stack.
I'm interested →