Alternatives for CyberSec First Responder (CFR-310)

Unfortunately it is not possible to request a brochure for this training. Here you will find some alternatives for "CyberSec First Responder (CFR-310)" by Stone River eLearning LLC. We hope we helped you to continue your search for training information.

check_box_outline_blank

CompTIA CySA+ | Cyber Security Analyst | CS0-003 (e-learning)

Logo DutchTrain
|META_INFO|

CompTIA CySA+ | Cyber Security Analyst | CS0-003 The CompTIA Cybersecurity Analyst (CySA+) course is the only intermediate high-stakes cybe…

check_box_outline_blank

EC-Council Certified Ethical Hacker (CEH) V13 incl. examen 312-50

Logo DutchTrain
|META_INFO|

EC-Council Certified Ethical Hacker (CEH) V13 incl. examen By joining the AI Revolution as a Certified Ethical Hacker, you’ll gain the expe…

check_box_outline_blank

CompTIA CySA+ | Cyber Security Analyst | CS0-002 (e-learning)

Logo DutchTrain
|META_INFO|

CompTIA CySA+ | Cyber Security Analyst | CS0-002 A Cybersecurity Analyst is responsible for the overall security of IT systems. This begins…

check_box_outline_blank

Five Ways to Improve Your Insider Threat Program

Logo IT-Learning
|META_INFO|

As malicious and accidental insider threats become more prevalent, security leaders need to boost their insider threat programs (ITPs). In …

check_box_outline_blank

CCNA Cybersecurity (200-201) v1.2 Cert Prep

Logo IT-Learning
|META_INFO|

This course prepares you for the CCNA Cybersecurity (200-201) v1.2 certification exam while providing practical, hands-on knowledge of mode…

check_box_outline_blank

CompTIA CySA+ - Cyber Security – eLearning (exam included)

Logo Adding Value Consulting EN
|META_INFO|

CompTIA CySA+ - Cyber Security – eLearning (exam included) CompTIA Cybersecurity Analyst (CySA+) is a performance-based qualification for c…

check_box_outline_blank

Foundations of Detection Engineering

Logo IT-Learning
|META_INFO|

Cybersecurity threats are everywhere. They’re numerous, constantly evolving, and it’s not a matter of if you’ll face a threat, but wh…

check_box_outline_blank

Introduction to Threat Hunting and Hunting with Elastic: Cybersecurity Labs Powered by Hack the Box

Logo IT-Learning
|META_INFO|

Learn about modern threat hunting, starting with a clear definition of the practice and its role in proactive cybersecurity operations, inc…

check_box_outline_blank

Managed Detection and Response (MDR) Advanced Strategies

Logo IT-Learning
|META_INFO|

Looking to take a deeper dive into the world of managed detection and response (MDR)? With a focus on advanced tools such as Microsoft Sent…

check_box_outline_blank

AI-Driven Threat Response with Microsoft Defender for Cloud

Logo IT-Learning
|META_INFO|

If you’re a cloud architect, IT manager, or cybersecurity analyst, you need to protect your organization from threats in the cloud. In th…

check_box_outline_blank

Security Operations (SecOps) Essentials: Detecting and Responding to Security Threats

Logo IT-Learning
|META_INFO|

In this detailed course, strategic cybersecurity leader Michael Wylie dives into the intricate world of Security Operations (SecOps). Learn…

check_box_outline_blank

The AI-Driven Cybersecurity Analyst

Logo IT-Learning
|META_INFO|

Artificial intelligence is transforming cybersecurity. Are you ready to transform with it? Learn to harness the power of AI in this course …

check_box_outline_blank

AWS Certified Security - Specialty (SCS-C02) Cert Prep: 1 Threat Detection and Incident Response

Logo IT-Learning
|META_INFO|

The AWS Certified Security – Specialty (SCS-C02) exam is intended for individuals who perform a security role. The exam validates a candi…

check_box_outline_blank

Detection and Response with XDR: Integrated Security Solutions to Combat Emerging Threats

Logo IT-Learning
|META_INFO|

Modern security operations face a rapidly evolving threat landscape, making it difficult to gain complete visibility across an array of dis…

check_box_outline_blank

Complete Guide to Open Source Security

Logo IT-Learning
|META_INFO|

The course covers a selection of open-source tools for each major area of cybersecurity. These include governance and risk tools, firewalls…