FortiSOAR Administrator
In this course, you will learn about FortiSOAR architecture, and how to deploy, configure, manage,...
We would like to inform you that both our Computer Pride Nairobi and Mombasa offices will be closed completely from Wednesday, 19th July 2023 to Thursday, 27th July 2023. We will resume our regular operations on Friday, 28th July 2023.
This closure is in observance of the special Ashara Mubaraka prayers. In case of any urgent inquiries or assistance, please feel free to contact us at info@computer-pride.co.ke.
In this course, you will learn about FortiSOAR architecture, and how to deploy, configure, manage,...
In this course, you will learn the fundamentals of using FortiAnalyzer for centralized logging. You...
In this course, you will learn how to deploy, configure, and troubleshoot secure wireless LAN...
In this interactive course, you will learn how to deploy, provision, and manage a FortiSwitch...
In this course, you will learn how to deploy, configure, and secure FortiAnalyzer. You will...
In this course, you will learn how to use FortiAuthenticator for secure authentication and identity...
In this course, you will learn how to leverage the powerful and diverse capabilities of...
In this course, you will learn how to use the FortiClient EMS features, provision FortiClient...
In this course, you will learn the fundamentals of using FortiManager for the centralized network...
In this course, you will learn how to use the most common FortiGate features. In...
The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v2.0 e-learning course shows you...
Cybersecurity professionals require a well-rounded understanding of the tools, processes, and strategies that can be...
The stakes for software security are very high, and yet many development teams deal with...
A single email can lead to a multi-million dollar breach in seconds, and the employee...
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data...
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure...
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based...
This course provides IT Identity and Access Professional, along with IT Security Professional, with the...
This course provides professionals with a strong understanding of business continuity and disaster recovery principles,...
This course provides individuals with the necessary knowledge and skills to protect their information assets....
The Data Protection module sets out essential knowledge relating to data protection concepts and principles,...
In this course, you will master the skills and technologies you need to implement core...
In this course students will gain the knowledge and skills needed to implement security controls,...
This Cyber Security course allows candidates to understand the main concepts underlying the secure use...
EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral...
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioural analytics to networks...
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core...
Certified Network Defender CND v2 provides a comprehensive approach to effectively deal with security issues...
Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and...
The Level 5 Diploma in Computing (with Cyber Security (L5DC CS) (previously Level 5 Diploma...
 Click here to download our October – December 2024 Training Schedule.