K Labs mette a tua disposizione i propri Trainers Certificati, i Laboratori Didattici, i Simulatori di Esame, il proprio Test Center e un Tutor a te dedicato per la preparazione all'esame.
Grazie al nostro supporto la percentuale di candidati che ottengono la certificazione al primo tentativo è prossima al 100%.
Cybersecurity Awareness
Code: KLA-CYBSAW
Duration: 1 day
Level: Non-technical Skills
Main Category
CYBERSEC
COURSE DESCRIPTION
This training will cover essential online safety best practices. Attending the course you will be able to learn key actual topics like protection from phishing, malware and general safe internet habits: it is ideal for individuals and organizations seeking to improve their digital security awareness.
Cybersecurity Fundamentals
Code: KLA-CYBSFUN
Duration: 1 day
Level: Basic
Main Category
CYBERSEC
COURSE DESCRIPTION
This training will cover the basics of cybersecurity, including the risks related to security and the concepts needed to recognize and mitigate attacks against enterprise networks and mission-critical infrastructure. During the training different types of attacks and the related defense mechanisms will introduced and explained. It is essential for understanding the security landscape and how to protect businesses from negative impact of cyberattacks.
Network Security and Firewalling
Code: KLA-NSFIREW
Duration: 3 days
Level: Basic
Main Category
CYBERSEC
Related categories
NETWORKING
COURSE DESCRIPTION
This training will cover the basics of network security and firewalls, including Next Generation Firewall functions, how to configure them, and how to use them to protect networks. The course delves into foundational knowledge of stateful filtering, security objects, security policies, NAT, Application Control and L7 Content Security. Through demonstrations and hands-on labs, students will gain experience in configuring and managing NGFW.
VPN and Secure Remote Access
Code: KLA-VPNSRA
Duration: 2 days
Level: Intermediate
Main Category
CYBERSEC
Related categories
NETWORKING
COURSE DESCRIPTION
This training will cover the basics of VPNs technology, explaining the most common security protocols, and their implementation to secure remote access. Learn how to use and configure VPNs for different scenarios like Site-to-Site IPsec VPN, SSL VPN for client access and have an introduction to new technologies like SD-WAN or SASE. It is essential for understanding how to allow remote users to securely access enterprise resources, on-premises or in cloud.
Security Monitoring, SIEM and SOAR
Code: KLA-SIEMSOAR
Duration: 2 days
Level: Intermediate
Main Category
CYBERSEC
Related categories
NETWORKING
COURSE DESCRIPTION
This training will cover how to perform security monitoring in an organization. The most common tools for centralized threat detection will be introduced, like the SIEM (Security Information and Event Management) systems that are commonly used in a SOC (Security Operation Center) along with SOAR (Security Orchestration Automation and Response). Learn practical skills in configuring and managing SIEM and SOAR solutions to effectively detect, monitor, analyze, and respond to security incidents.
Endpoint Cybersecurity and Management
Code: KLA-CYBSENDP
Duration: 2 days
Level: Intermediate
Main Category
CYBERSEC
Related categories
NETWORKING
COURSE DESCRIPTION
This training will cover modern Endpoint Protection Solutions. In this course, you will discover the different approaches available to achieve endpoint security in the era of remote working, including device threat detection, response strategies, and centralized management of company devices. It is essential for understanding how to protect endpoints and business resources from attacks, following the Zero Trust security approach.
Web Application Firewall (WAF), Features and Functions
Code: KLA-WAFFF
Duration: 2 days
Level: Intermediate
Main Category
CYBERSEC
Related categories
NETWORKING
COURSE DESCRIPTION
This training will cover the features and functions of today’s Web Application Firewall solutions. The network topologies and the specific functions of application layer firewall are analyzed. The course includes lab sessions on real equipment, in order to better understand the topics and acquire skills of analysis and troubleshooting.
Implementing IPv6 Security
Code: KLA-IPV6SEC
Duration: 1 day
Level: Intermediate
Main Category
CYBERSEC
Related categories
NETWORKING
COURSE DESCRIPTION
This training will cover the security aspects needed to consider when implementing IPv6. The different structure and usage of the IPv6 will be explained, along with the best practices about the design and the technology in order to provide encryption and privacy to the users.
Introduction to Quantum Security using QKD
Code: KLA-IQUASEC
Duration: 2 days
Level: Basic
Main Category
CYBERSEC
COURSE DESCRIPTION
This introductory training will cover the fundamentals of quantum technology applied to the cryptography. The course will be focused on the perspectives of Quantum Key Distribution (QKD), where the security of communication relies on the fundamental properties of quantum states of light and introducing its potential in response to the threats that quantum computers can introduce against current cryptography techniques. In this course, you will learn how the cybersecurity risk landscape is evolving as well as explore future approaches using QKD security
Ethical Hacking and Penetration Testing
Code: KLA-ETHACK
Duration: 4 days
Level: Advanced
Main Category
CYBERSEC
Related categories
NETWORKING
COURSE DESCRIPTION
This training will cover the techniques of ethical hacking and its usage to perform vulnerability assessment and penetration testing. The course will explain the steps to identify, test and exploit common vulnerabilities in web applications, networks, and devices. You will gain hands-on experience in using various penetration testing tools, preparing reports, and begin the path to become an ethical hacker.
Secure Coding
Authentication and Encryption Technologies
Code: KLA-AUTENCR
Duration: 2 days
Level: Advanced
Main Category
CYBERSEC
COURSE DESCRIPTION
This training delves into the authentication and encryption technologies, providing a comprehensive understanding of the essential security measures. From hashing algorithms to digital certificates and public key infrastructure (PKI), you will gain the knowledge and skills to protect your data effectively in transit and at rest. The most common mechanism of authentication for users and devices / application will be explained with examples. Multifactor Authentication and SAML (Security Assertion Markup Language) will be explained as well.
Cloud Security Design
Code: KLA-CLOSEC
Duration: 2 days
Level: Advanced
Main Category
CLOUD
Related Categories
CYBERSEC
COURSE DESCRIPTION
Immerse yourself in the cutting-edge realm of Cloud Security Design with this comprehensive course. Delve into the intricacies of securing cloud architectures, mastering robust strategies for risk mitigation and compliance. From identity and access management to encryption and threat detection, learn to fortify your cloud infrastructure against evolving cyber threats. Acquire practical skills to design secure, resilient cloud environments, making this course essential for those committed to safeguarding sensitive data in the dynamic landscape of cloud computing.
Securing Spring Boot Applications
Code: KLA-SPBSEC
Duration: 2 days
Level: Advanced
Main Category
CODING
Related Categories
CYBERSEC
COURSE DESCRIPTION
Empower Java applications with robust security features. This specialized program is crafted for Java developers looking to implement comprehensive security in Spring Boot applications. Learn the essentials of Spring Security, from basic authentication and authorization to advanced OAuth2 and JWT. We cover a range of security practices, including securing REST APIs, user roles and permissions, and CSRF protection. Through hands-on examples, you will tailor Spring Security to your specific application needs, ensuring data integrity and user safety.
Secure Coding
Code: KLA-SECOD
Duration: 2 days
Level: Advanced
Main Category
CODING
Related Categories
CYBERSEC
COURSE DESCRIPTION
This course focuses on secure coding best practices deepening the principles of secure programming and designing. It explores how to manage Authentication and Authorization flows and learn threat modeling and the most common software vulnerabilities. The course also explains the concept of observability: overview of logging, monitoring, tracing and why they are fundamental for safety. You will learn about data management by exploring techniques to manage data securely, including encryption, backup and deletion procedures.