Sponsored by Keepnet Labs

Tag - ENSA

Network Security Administrator Erdal

Network Security Administrator (ENSA) Free Certification Week 2

Network Security Administrator Lecture 2: Security Standards Security Policy Network Security Threats DEMO: Network security threats from real life Delivered by Erdal Ozkaya Week 1 : https://www.erdalozkaya.com/network-security-administrator/ (more…)


Network Security Administrator Erdal

Network Security Administrator (ENSA) Free Certification Week 3

Lecture 3: Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) Firewalls Bastion Host and Honeypots DEMO: The use of IDS, IPS, and firewalls in real life   Erdal (more…)


Enrolments pour in for free security course by Erdal Ozkaya

Enrolments pour in for free security course – 2014

Enrolments pour in for free security course IT Masters and Charles Sturt University have been flooded with enrolments for the Network Security Administrator free short course starting 23 January that sets students on the road to obtaining the EC-Council Network Security Administrator (ENSA) certification. The course covers the first five weeks of the subject ITI581: Network Security Fundamentals in the Master of Information Systems [...]


Network Security Administrator Erdal

Network Security Administrator (ENSA) Free Certification Week 1

Network Security Administrator Lecture 1: - Welcome to Cyber Security Administration Why Security? Fundamentals of Computer Network Network Security DEMO: How hackers sneak into our networks Delivered by Erdal Ozkaya (more…)


Network Security Administrator Erdal

Network Security Administrator (ENSA) Certification Free Short Course -2014

Network Security Administrator This short course is designed to partially prepare you for certification as an EC-Council Network Security Administrator (ENSA). The ENSA certification program looks at network security from a defensive view. It is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s [...]