K Labs goes along with you providing you with its Certified Trainers, Training Laboratories, Exam Simulators, the Test Center and a dedicated Tutor that helps you to prepare for the exam. 
 

Thanks to our support, the percentage of candidates who obtain the certification at the first attempt is very close to 100%.
 

fabio-oyxis2kalvg-unsplash (1).jpeg
939869167014516ec34430a26728e18e 2

Keep yourself updated on latest courses.

Subscribe!

Keep yourself updated on latest courses.

Subscribe!

logo k labs nuovo-white

CYBERSECURITY

logo k labs nuovo-white

Attending one of the courses of this category and passing the related skills assessment test, you will get the "Cybersecurity" CERTIFIED ENGINEER Digital Badge to share on your preferred Social Networks.

K Labs S.R.L. 

Tel. +39 059 8212 29 | info@klabs.it

VAT IT02034520367

 

PRIVACY and COOKIES

 

PRIVACY and COOKIES

 

CODE OF ETHICS

 

©2024  K LABS Srl - RESERVED RiGHTS


linkedin

©2024  K LABS Srl - RESERVED RiGHTS


linkedin

FOLLOW US

FOLLOW US

Cybersecurity Awareness

Code: KLA-CYBSAW

Duration: 1 day

Level: Non-technical Skills

Main Category

     CYBERSEC

 

security.jpeg

COURSE DESCRIPTION

This training will cover essential online safety best practices. Attending the course you will be able to learn key actual topics like protection from phishing, malware and general safe internet habits: it is ideal for individuals and organizations seeking to improve their digital security awareness.

Cybersecurity Fundamentals

Code: KLA-CYBSFUN

Duration: 1 day

Level: Basic

Main Category

     CYBERSEC

 

adobestock_245143037.jpeg

COURSE DESCRIPTION

This training will cover the basics of cybersecurity, including the risks related to security and the concepts needed to recognize and mitigate attacks against enterprise networks and mission-critical infrastructure. During the training different types of attacks and the related defense mechanisms will introduced and explained. It is essential for understanding the security landscape and how to protect businesses from negative impact of cyberattacks.

Network Security and Firewalling

adobestock_647105727.jpeg

Code: KLA-NSFIREW

Duration: 3 days

Level: Basic

Main Category 

     CYBERSEC

Related categories

     NETWORKING

COURSE DESCRIPTION

This training will cover the basics of network security and firewalls, including Next Generation Firewall functions, how to configure them, and how to use them to protect networks. The course delves into foundational knowledge of stateful filtering, security objects, security policies, NAT, Application Control and L7 Content Security. Through demonstrations and hands-on labs, students will gain experience in configuring and managing NGFW.

VPN and Secure Remote Access

adobestock_206769563.jpeg

Code: KLA-VPNSRA

Duration: 2 days

Level: Intermediate

Main Category 

     CYBERSEC

Related categories

     NETWORKING

COURSE DESCRIPTION

This training will cover the basics of VPNs technology, explaining the most common security protocols, and their implementation to secure remote access. Learn how to use and configure VPNs for different scenarios like Site-to-Site IPsec VPN, SSL VPN for client access and have an introduction to new technologies like SD-WAN or SASE. It is essential for understanding how to allow remote users to securely access enterprise resources, on-premises or in cloud.

Security Monitoring, SIEM and SOAR

adobestock_332234118 (siemsoar).jpeg

Code: KLA-SIEMSOAR

Duration: 2 days

Level: Intermediate

Main Category 

     CYBERSEC

Related categories

     NETWORKING

COURSE DESCRIPTION

This training will cover how to perform security monitoring in an organization. The most common tools for centralized threat detection will be introduced, like the SIEM (Security Information and Event Management) systems that are commonly used in a SOC (Security Operation Center) along with SOAR (Security Orchestration Automation and Response). Learn practical skills in configuring and managing SIEM and SOAR solutions to effectively detect, monitor, analyze, and respond to security incidents.

Endpoint Cybersecurity and Management

cybersecurity

Code: KLA-CYBSENDP

Duration: 2 days

Level: Intermediate

Main Category 

     CYBERSEC

Related categories

     NETWORKING

COURSE DESCRIPTION

This training will cover modern Endpoint Protection Solutions. In this course, you will discover the different approaches available to achieve endpoint security in the era of remote working, including device threat detection, response strategies, and centralized management of company devices. It is essential for understanding how to protect endpoints and business resources from attacks, following the Zero Trust security approach.

Web Application Firewall (WAF), Features and Functions

binario.jpeg

Code: KLA-WAFFF

Duration: 2 days

Level: Intermediate

Main Category 

     CYBERSEC

Related categories

     NETWORKING

COURSE DESCRIPTION

This training will cover the features and functions of today’s Web Application Firewall solutions. The network topologies and the specific functions of application layer firewall are analyzed. The course includes lab sessions on real equipment, in order to better understand the topics and acquire skills of analysis and troubleshooting.

Implementing IPv6 Security

ipv6s - fotolia_56073990_s.jpeg

Code: KLA-IPV6SEC

Duration: 1 day

Level: Intermediate

Main Category 

     CYBERSEC

Related categories

     NETWORKING

COURSE DESCRIPTION

This training will cover the security aspects needed to consider when implementing IPv6. The different structure and usage of the IPv6 will be explained, along with the best practices about the design and the technology in order to provide encryption and privacy to the users.

Introduction to Quantum Security using QKD

Code: KLA-IQUASEC

Duration: 2 days

Level: Basic

Main Category 

     CYBERSEC

 

adobestock_215123311.jpeg

COURSE DESCRIPTION

This introductory training will cover the fundamentals of quantum technology applied to the cryptography. The course will be focused on the perspectives of Quantum Key Distribution (QKD), where the security of communication relies on the fundamental properties of quantum states of light and introducing its potential in response to the threats that quantum computers can introduce against current cryptography techniques. In this course, you will learn how the cybersecurity risk landscape is evolving as well as explore future approaches using QKD security.

Ethical Hacking and Penetration Testing

Code: KLA-ETHACK

Duration: 4 days

Level: Advanced

Main Category 

     CYBERSEC

Related categories

     NETWORKING

adobestock_338003330.jpeg

COURSE DESCRIPTION

This training will cover the techniques of ethical hacking and its usage to perform vulnerability assessment and penetration testing. The course will explain the steps to identify, test and exploit common vulnerabilities in web applications, networks, and devices. You will gain hands-on experience in using various penetration testing tools, preparing reports, and begin the path to become an ethical hacker.

Secure Coding

Authentication and Encryption Technologies

adobestock_336352813(autencr).jpeg

Code: KLA-AUTENCR

Duration: 2 days

Level: Advanced

Main Category 

    CYBERSEC

 

COURSE DESCRIPTION

This training delves into the authentication and encryption technologies, providing a comprehensive understanding of the essential security measures. From hashing algorithms to digital certificates and public key infrastructure (PKI), you will gain the knowledge and skills to protect your data effectively in transit and at rest. The most common mechanism of authentication for users and devices / application will be explained with examples. Multifactor Authentication and SAML (Security Assertion Markup Language) will be explained as well.

Cloud Security Design

Code: KLA-CLOSEC

Duration: 2 days

Level: Advanced

Main Category

     CLOUD

Related Categories

     CYBERSEC

cloud security_adobestock_574743730.jpeg

COURSE DESCRIPTION

Immerse yourself in the cutting-edge realm of Cloud Security Design with this comprehensive course. Delve into the intricacies of securing cloud architectures, mastering robust strategies for risk mitigation and compliance. From identity and access management to encryption and threat detection, learn to fortify your cloud infrastructure against evolving cyber threats. Acquire practical skills to design secure, resilient cloud environments, making this course essential for those committed to safeguarding sensitive data in the dynamic landscape of cloud computing.

Securing Spring Boot Applications

Code: KLA-SPBSEC

Duration: 2 days

Level: Advanced

Main Category

     CODING

Related Categories

     CYBERSEC

software1.jpeg

COURSE DESCRIPTION

Empower Java applications with robust security features. This specialized program is crafted for Java developers looking to implement comprehensive security in Spring Boot applications. Learn the essentials of Spring Security, from basic authentication and authorization to advanced OAuth2 and JWT. We cover a range of security practices, including securing REST APIs, user roles and permissions, and CSRF protection. Through hands-on examples, you will tailor Spring Security to your specific application needs, ensuring data integrity and user safety.

Secure Coding

secod

Code: KLA-SECOD

Duration: 2 days

Level: Advanced

Main Category

     CODING

Related Categories

     CYBERSEC

COURSE DESCRIPTION

This course focuses on secure coding best practices deepening the principles of secure programming and designing. It explores how to manage Authentication and Authorization flows and learn threat modeling and the most common software vulnerabilities. The course also explains the concept of observability: overview of logging, monitoring, tracing and why they are fundamental for safety.You will learn about data management by exploring techniques to manage data securely, including encryption, backup and deletion procedures.