List of all the courses offered by Secure Ninja.
Secure Ninja offers a total of 15 courses.
If you’ve ever struggled in a programming class because you wanted the instructor to put programming concepts in plain and simple English and if you’ve ever wanted a programming course to be about stuff you could actually use at work – this class is for you.
SecureNinja’s IPv6 Fundamentals and Implementation (3) three-day hands-on training boot camp provides the latest skills and knowledge regarding IPv6 technology.  The main advantage of IPv6 over IPv4 is its larger address space.
If you’ve ever struggled in a programming class because you wanted the instructor to put programming concepts in plain and simple English and if you’ve ever wanted a programming course to be about stuff you could actually use at work – this class is for you.
SecureNinja's CEH v11 (Certified Ethical Hacker) training and certification boot camp will immerse students into a hands-on environment where they will be shown how to conduct ethical hacking.
SecureNinja's Security+ class will prepare you for the certification exam and covers important foundational principles for securing networks and risk management. Â Access control, identity management, and cryptography are important topics on the exam.
This course explains the elements and supporting materials of the COBIT framework using a logical and example-driven approach for everyone interested in obtaining Foundation-level knowledge of COBIT.
SecureNinja's accredited ISO/IEC 20000 Foundation training and certification boot camp in Washington, DC, San Diego, CA or in blended online format prepares candidates for the foundation qualification.
SecureNinja's expert  ITIL® foundation training and certification boot camp in Washington, DC, San Diego, CA or live online is an exciting and dynamic (3) three-day course, fully updated for ITIL.
This course is a beginner level course designed for anyone who wants to learn or expand their knowledge of blockchain technology and how blockchain technology can be applied in business.
This course provides an overview of a different side of security and teaches candidates how to protect assets within an enterprise cloud computing environment.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy