Training
$750
M365 Security Boost
In this lecture-style class developed and presented by Marcus Pettersson (Senior Consultant), together with Daniel Chronlund (Senior Consultant), you will learn how to protect and /../
Learn moreTrainings
Deepen your knowledge in cybersecurity, development, and infrastructure with our dedicated experts. Choose from a wide range of practical exercises with advanced training options, customized tools, and effective methods.
Training
$750
In this lecture-style class developed and presented by Marcus Pettersson (Senior Consultant), together with Daniel Chronlund (Senior Consultant), you will learn how to protect and /../
Learn moreTraining
This helps reduce the risk of being affected both by mistakes in development and, for example, vulnerabilities in third-party dependencies. Additionally, a secure coding standard /../
Learn moreTraining
We use OWASP Juice Shop as a training ground. We’ll discuss mitigations and how you can avoid the vulnerability class when developing using patterns and /../
Learn moreTraining
This two-day lecture-style course, developed and presented by Simon Binder, Microsoft MVP, is aimed at device administrators that want to learn how to configure and /../
Learn moreTraining
1895
In this lecture-style class developed and presented by Viktor Hedberg, Senior Consultant at Truesec and Microsoft MVP, alongside Marcus Pettersson, Senior Consultant at Truesec, you’ll /../
Learn moreTraining
1595
Learn how to take control of your mobile devices and allow your workforce to be productive while ensuring that your corporate data is secure. This /../
Learn moreTraining
3495
Online Virtual | Attend in Person Level: 200 Prerequisites:Basic scripting knowledge in any scripting language. Course Objectives:After completing this lab, you’ll have learned the fundamentals /../
Learn moreTraining
This lab is developed by two experienced Windows Client deployment and management experts, Johan Arwidmark and Peter Löfgren, which makes this lab unique. The systems /../
Learn moreTraining
1835
To improve your organization’s resilience against social engineering, you must first understand the anatomy of social engineering attacks. This social engineering class is developed by /../
Learn more