Stay one step ahead of threats with Check Point’s industry leading cyber security products for threat prevention, mobile security, data centers, next-generation firewalls, and security management.
The class will cover advanced penetration techniques to achieve exploitation and will familiarize you with hacking of common operating systems, networking devices and much more.
Learn hacking techniques that compromise web apps, APIs, and associated end-points. The class focuses on server-side flaws. The vulnerabilities we present usually go undetected by modern scanners.
This exciting new offering is a 2-day Specialist course which provides a comprehensive understanding of automation and the Check Point’s Management API architecture.
This five-day course combines the Check Point Security Administration R80.20 & Check Point Security Engineering R80.20 courses.
This three-day course covers everything you need to start-up, configure and manage daily operations of Check Point Security Gateway and Management Software Blades systems on the GAiA operating system.
This advanced three-day course teaches how to build, modify, deploy and troubleshoot Check Point Security Systems on the GAiA operating system.
This three-day course provides advanced training to manage virtualized security in high-end networks and advanced security optimization techniques.
This workshop provides an understanding of basic concepts and skills necessary to configure Check Point CloudGuard products for use in Amazon Web Services.
Hacking 101 is built to train professionals in the realm of Pen Testing, by providing knowledge and skills in areas of network, system, network, web and applications hacking, as well as in Reverse Engineering.
The ideal introductory/intermediate training class designed to teach the fundamentals of what pen testing is all about.
This technical 4-day course covers all the fundamentals of malware analysis, providing the student with a solid understanding of the malware world, as well as the tools and hands-on skills required in order to effectively analyze malicious files.
If you would like to step into the world of ethical hacking / penetration testing with a focus on web applications, then this is the class for you.
There is no upcoming training scheduled right now. Please check back soon.