Details of selected DDoS Attacks – How the attacks work from a technical perspective

Join WP8 T1 team for the "Details of selected DDoS Attacks -…

DDoS Mitigation

Join WP8 T1 team for the "DDoS Mitigation - What you can do…

Collecting and disseminating vulnerability information

Join WP8 T1 team for the "Vulnerability management process and…

DDoS Detection

Join WP8 T1 team for the "Introduction to DDoS Attacks - An…

Vulnerability Management process and standards

Join WP8 T1 team for the "Vulnerability management process and…

Patch management

Join WP8 T1 team for the "Vulnerability management process and…

Network vulnerability scanning

Join WP8 T1 team for the "Network vulnerability scanning" live…

Local vulnerability scanning

Join WP8 T1 team for the "Local vulnerability scanning" live…

Penetration tests

Join WP8 T1 team for the "Penetration tests" live online session.…

ITIL® 4 Leader – Digital & IT Strategy

Course Summary The three-day ITIL® 4 Leader: Digital…

ITIL® 4 Strategist – Direct, Plan & Improve

Course Summary The ITIL® Strategist – Direct, Plan,…

ITIL® 4 Specialist – Drive Stakeholder Value

Course Summary The ITIL® Specialist: Drive Stakeholder…