Network Security Training Courses in Finland

Network Security Training Courses

Online or onsite, instructor-led live Network Security training courses demonstrate through interactive discussion and hands-on practice the fundamentals of Network Security and cover topics such as detection, prevention and security testinig for beginners as well as advanced engineers.

Network Security training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Network Security training can be carried out locally on customer premises in Finland or in NobleProg corporate training centers in Finland.

NobleProg -- Your Local Training Provider

Testimonials

★★★★★
★★★★★

Network Security Subcategories in Finland

Network Security Course Outlines in Finland

Course Name
Duration
Overview
Course Name
Duration
Overview
21 hours
This instructor-led, live training in Finland (online or onsite) is aimed at security professionals who wish to learn how to use Cortex XDR in preventing and stopping the occurrence of sophisticated attacks and threats. By the end of this training, participants will be able to:
  • Understand the architecture and components of Cortex XDR.
  • Create and manage profiles for exploit and malware prevention.
  • Analyze behavioral threats and monitor response actions.
  • Perform basic Cortex app troubleshooting.
21 hours
This instructor-led, live training in Finland (online or onsite) is aimed at security professionals who wish to learn how to troubleshoot Palo Alto Networks' next-generation firewalls. By the end of this training, participants will be able to:
  • Understand the architecture of the next-generation firewall.
  • Investigate and troubleshoot networking issues using firewall tools.
  • Analyze advanced logs to resolve real-life scenarios.
21 hours
This instructor-led, live training in Finland (online or onsite) is aimed at security professionals who wish to learn how to manage firewalls at scale. By the end of this training, participants will be able to:
  • Design, configure, and manage the Panorama FireWall management server.
  • Manage policies using device groups.
  • Roll out network configurations to different firewalls.
14 hours
This instructor-led, live training in Finland (online or onsite) is aimed at systems administrators who wish to learn how to use Zscaler to secure network connections for applications and cloud services. By the end of this training, participants will be able to:
  • Learn and understand the architecture security on Zscaler.
  • Understand the value and baseline features of Zscaler advanced configurations.
  • Use Zscaler to secure network connections for applications and cloud services.
21 hours
This instructor-led, live training in Finland (online or onsite) is aimed at security professionals who wish to learn the fundamentals of managing Palo Alto Networks' next-generation firewalls. By the end of this training, participants will be able to:
  • Configure and manage Palo Alto Networks' firewall essential features.
  • Manage security and NAT policies.
  • Manage threat prevention strategies.
  • Monitor network threats and traffic.
14 hours
This instructor-led, live training in Finland (online or onsite) is aimed at experienced network security managers who wish to gain the knowledge and skills needed to deploy, manage, and troubleshoot Fortinet's FortiGate security appliances running on FortiOS 7.2 as an NSE4 Network Security Professional. By the end of this training, participants will be able to:
  • Understand Fortinet's product portfolio and the role of FortiOS in network security.
  • Implement effective firewall policies, security profiles, and Network Address Translation (NAT).
  • Utilize security services and ensure network redundancy and failover.
  • Implement security best practices and optimize security policies for compliance and threat mitigation.
14 hours
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN. In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment. By the end of this training, participants will be able to:
  • Assess their organization's existing security model.
  • Shift access controls from the perimeter to individual devices and users.
  • Deploy applications using a user and device-centric authentication and authorization workflow.
  • Understand, plan and implement a Zero Trust network within their organization.
Audience
  • Network engineers
  • Cyber security professionals
  • System architects
  • IT managers
Format of the Course
  • Part lecture, part discussion, exercises and heavy hands-on practice
Note
  • To request a customized training for this course, please contact us to arrange.
14 hours
Since all applications today heavily rely on communication and networks, there is no application security without network security. This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service. As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS. Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details. Participants attending this course will
  • Understand basic concepts of security, IT security and secure coding
  • Learn about network attacks and defenses at different OSI layers
  • Have a practical understanding of cryptography
  • Understand essential security protocols
  • Understand some recent attacks against cryptosystems
  • Get information about some recent related vulnerabilities
  • Get sources and further readings on secure coding practices
Audience Developers, Professionals
14 hours
During the course, participants will learn:
  • What is denial of service attacks, Flooding, Sniffing, MIM?
  • How to break from the network to the server?
  • How to watch packets on the network (also running on switches)?
  • Do you watch any combination of the world?
  • How to monitor the network?
  • How to configure a firewall?
  • How to use encrypted connections?
  • How to create tunnels?
  • How to log packets?
  • How to scan ports?
  • How to reduce the number of unnecessary services on the server?
35 hours
This instructor-led, live training in Finland (online or onsite) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.
14 hours
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management. In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning. By the end of this training, participants will be able to:
  • Install and configure OpenVAS
  • Learn the fundamental features and components of OpenVAS
  • Configure and implement network vulnerability scans with OpenVAS
  • Review and interpret OpenVAS scan results
Audience
  • Network engineers
  • Network administrators
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice
Note
  • To request a customized training for this course, please contact us to arrange.
21 hours
This instructor-led, live training in Finland (online or onsite) is aimed at developers who wish to prevent malware intrusion with Palo Alto Networks. By the end of this training, participants will be able to:
  • Set up the necessary development environment to start developing firewalls.
  • Deploy a Palo Alto firewall in a cloud server.
  • Manage packet flow through Palo Alto firewalls.
  • Interpret QoS classifications and types.
14 hours
This instructor-led, live training in Finland (online or onsite) is aimed at software testers who wish to protect their organization's network with Nmap. By the end of this training, participants will be able to:
  • Set up the necessary testing environment to start using Nmap.
  • Scan network systems for security vulnerabilities.
  • Discover active and vulnerable hosts.
21 hours
This instructor-led, live training in Finland (online or onsite) is aimed at security engineers and system administrators who wish to use FortiGate NGFW's advanced security-driven network systems to protect their organization from internal and external threats. By the end of this training, participants will be able to:
  • Install and configure the preferred FortiGate NGFW software and hardware model.
  • Operate and employ FortiGate NGFW to improve the efficiency of system administration tasks.
  • Manage various forms of external and internal threats using FortiGate features.
  • Integrate FortiGate security fabric with the entire IT infrastructure to provide quick automated protection.
  • Ensure long-term protection from attacks with independent and continuous FortiGate threat intelligence.
  • Troubleshoot the most common firewall system setup errors relevant to FortiGate NGFWs.
  • Implement Fortinet security solutions in other enterprise applications.
35 hours
Audience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.  

Last Updated:

Online Network Security courses, Weekend Network Security courses, Evening Network Security training, Network Security boot camp, Network Security instructor-led, Weekend Network Security training, Evening Network Security courses, Network Security coaching, Network Security instructor, Network Security trainer, Network Security training courses, Network Security classes, Network Security on-site, Network Security private courses, Network Security one on one training

Course Discounts

No course discounts for now.

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking for a good mixture of IT and soft skills in Finland!

As a NobleProg Trainer you will be responsible for:

  • delivering training and consultancy Worldwide
  • preparing training materials
  • creating new courses outlines
  • delivering consultancy
  • quality management

At the moment we are focusing on the following areas:

  • Statistic, Forecasting, Big Data Analysis, Data Mining, Evolution Alogrithm, Natural Language Processing, Machine Learning (recommender system, neural networks .etc...)
  • SOA, BPM, BPMN
  • Hibernate/Spring, Scala, Spark, jBPM, Drools
  • R, Python
  • Mobile Development (iOS, Android)
  • LAMP, Drupal, Mediawiki, Symfony, MEAN, jQuery
  • You need to have patience and ability to explain to non-technical people

To apply, please create your trainer-profile by going to the link below:

Apply now!

This site in other countries/regions