-
The IT landscape has changed dramatically in recent years! Working from home and mobile working have become the norm in many industries. This has also changed the demands on the IT infrastructure. Familiar security technologies such as endpoint security have become more important and new security methods such as ZTNA and XDR have emerged.
This course deals with securing end devices. Classic and new security methods and security concepts such as Remote Access VPN, SASE, ZTNA and XDR are explained. Their possible applications are also demonstrated.
-
Course Contents
-
- Current threat situation
- Weaknesses of classic security architectures
- Remote Access VPN
- Secure Access Service Edge
- ZTNA
- Endpoint Detection and Response
- Network Detection and Response
- eXtended Detection and Response
- Endpoint Security
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
-
Target Group
-
The course is aimed at network administrators and planners who deal with the implementation, conception and realization of classic and modern endpoint security in IT infrastructures.
-
Knowledge Prerequisites
-
Network basics in the area of TCP/IP and routing are an advantage. In the area of IT security, basic methods for authentication and securing communication should be known.
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
The IT landscape has changed dramatically in recent years! Working from home and mobile working have become the norm in many industries. This has also changed the demands on the IT infrastructure. Familiar security technologies such as endpoint security have become more important and new security methods such as ZTNA and XDR have emerged.
This course deals with securing end devices. Classic and new security methods and security concepts such as Remote Access VPN, SASE, ZTNA and XDR are explained. Their possible applications are also demonstrated.
-
Course Contents
-
- Current threat situation
- Weaknesses of classic security architectures
- Remote Access VPN
- Secure Access Service Edge
- ZTNA
- Endpoint Detection and Response
- Network Detection and Response
- eXtended Detection and Response
- Endpoint Security
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
-
Target Group
-
The course is aimed at network administrators and planners who deal with the implementation, conception and realization of classic and modern endpoint security in IT infrastructures.
-
Knowledge Prerequisites
-
Network basics in the area of TCP/IP and routing are an advantage. In the area of IT security, basic methods for authentication and securing communication should be known.
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
