What is an ethical hacker?
Jochen den Ouden is ethical hacker - he uses the skill- and mindset of a hacker to find vulnerabilities in the security of an organization. This is called Ethical Hacking.
LEARN MORE IN THE VIDEOFrom ethical hacking to Incident Handling and Response and data security - it doesn't matter what kind of security training course you need. Global Knowledge has got you covered.
Promises, promises, right? Find out for yourself by browsing through the different security specializations underneath this text.
Not all risks can be eliminated. Figure out how to deal with security risks, without having them impact your organization. Implement disaster recovery and Business Continuity Plans (BCP) to prepare for any potential disruptive event. Learn why these plans are essential for damage control on this page.
How do you set up a succesfull cyber security operations team? Which skills does your perfect team need? An excellent cyber security operations team has defensive and offensive security skills. What? Find out more about the two different types of security and the perfect team on this page.
How well-protected is your personal or organization data? If your data ends up in the hands of a cyber criminal - the consequences can be disastrous. Make sure this doesn't happen - become data-smart!
How can you use hacking tools to do good? Become a Certified Ethical Hacker. As a Certified Ethical Hacker, you find the vulnerabilities in your organization and patch them before a cyber criminal can get to them. Curious? Find out more on this page.
Cyber incidents can be exceptionally costly to an organisation, so the speed at which you identify a breach and respond to the incident is crucial to the safety of your systems and data.
Governance Risk and Compliance (GRC) is a term that is often used to describe the three areas within an organization that need to work together to ensure an organisation is working as efficiently as effectively as possible
Make sure you know how to react to an incident, before it takes place. Focus on forming an incident response. It's better to be safe to be sorry. How? Follow an Forensic and Incident Response training course.
Start thinking about security when building your applications. Secure coding saves you money and time - because you won't have to do fixes afterwards. Curious? Check out all the secure coding courses Global Knowledge has to offer.
Jochen den Ouden is ethical hacker - he uses the skill- and mindset of a hacker to find vulnerabilities in the security of an organization. This is called Ethical Hacking.
LEARN MORE IN THE VIDEOOf course you want to know what to expect before you decide to book a training course. Find out what to expect of the Certified Threat Intelligence Analyst certification in this article.
READ THE ARTICLESecure coding takes time, but what do you get for the time you spend thinking about security while you're coding? Stuart Peck from ZeroDayLab explains.
WATCH THE VIDEOA cyber attack will not just cost you a lot of money - but the reputation of your company is on the line too. What can you do to protect yourself? Get an Incident Handling and Response plan ready. What?
FIND OUT MORE ABOUT THE PLANUber, Deliveroo, Facebook, your favorite apps all need your data to give you what you need from them. Learn from Global Knowledge trainer Michiel Broekhuijsen why it's crucial to protect your data in this video.
WATCH THE VIDEOGet your Cyber Security Roadmap and find out which training Courses you still need to do
LOOK AT THE MAP