May
30
Tue
TRAPS 3.4: INSTALL, CONFIGURE, AND MANAGE (EDU-281) @ Exclusive Networks
May 30 @ 09:00 – May 31 @ 17:00
TRAPS 3.4: INSTALL, CONFIGURE, AND MANAGE (EDU-281) @ Exclusive Networks | Duffel | Vlaanderen | Belgium
Date: 30-31/05/2017
Duration: 2 days
Timing: every day from 9am to 5pm
Price: €1750
Location: Exclusive Networks

Overview
Palo Alto Networks® Traps™ Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Successful completion of this two day, instructor-led course equips the student to install Traps in basic configurations.

Course Objectives
Students will learn how Traps protects against exploits and malware-driven attacks. In hands-on lab exercises, students will install and configure the Endpoint Security Manager (ESM) and Traps endpoint components; build rules; enable and disable process protections; and integrate Traps with Palo Alto Networks WildFire™, which provides prevention and detection of zero-day malware.
Jun
1
Thu
Palo Alto Networks Traps 3.4: Deploy and Optimise (EDU-285) @ Exclusive Networks
Jun 1 @ 09:00 – Jun 2 @ 17:00
Palo Alto Networks Traps 3.4: Deploy and Optimise (EDU-285) @ Exclusive Networks | Duffel | Vlaanderen | Belgium

Date: 1-2/06/2017
Duration: 2 days
Timing: every day from 9am to 5pm
Price: €1750
Location: Exclusive Networks


Description

The Traps Deploy and Optimise course combines instructor-led training and interactive labs to build a working knowledge of how to deploy Traps in large-scale or complex configurations and optimise its configuration. It includes topics such as automated distribution of Traps endpoint software, preparing master images for VDI deployment, building multi-ESM deployments, design and implementation of customised policies, testing Traps with exploits created using Metasploit and examining prevention dumps with WinDbg.

Target Audience
The Traps Deploy and Optimise course is intended for anyone is responsible for the installation, support and advanced management of a Palo Alto Networks® Traps™ Advanced Endpoint Protection solution. This includes forensics teams, installers, sales engineers, system engineers, professional services engineers (presales and post sales) and technical support professionals.

Jun
7
Wed
IPv6 Essentials Training @ Exclusive Networks
Jun 7 @ 09:00 – Jun 8 @ 17:00

Date:  7-8 June 2017
Duration:
2 days
Timing:
every day from 9am to 5pm
Price:
€ 1395 excl. VAT

Course Description

This IPv6 Training describes the functionality of IP Version 6 (IPv6). It discusses the new features of the protocol and compares it to IPv4, thereby offering a good overview of the functionality that you may need or desire in your network. All protocol elements are explained in easy to understand ways, as defined in the IPv6 specifications.

This 2-day training offers a great overview of the important facts to know about the new protocol for everybody who is involved with the integration of IPv6. It is of great value to everybody that architects networks, defines strategies and concepts, plans for tests and pilots and evaluates IPv6 support with vendors. It also discusses coexistence of IPv4 and IPv6 as well as transition mechanisms defined which will make the integration as smooth as possible.

Target Audience

This seminar is designed for technical decision makers, network architects and analysts, IT consultants, system and network administrators, vendors and application developers who need a well founded overview of the full functionality and the opportunities of IPv6. Everyone that is involved in planning and integration should have a good general understanding and will profit from this overview.

Duration

2 days

Prerequisites

A good understanding of networks and TCP/IP in general is very helpful. There is no prerequirement for IPv6.

Topics

  • Introduction
  • The Structure of the Protocol, the IPv6 Header and Extension Header Architecture
  • Mobile IPv6
  • IPv6 Addressing (Address Format and Prefixes, Address Types, Address Allocations)
  • ICMPv6 Functionality, new Message Types, Neighbor Discovery (ND), Stateless Address Autoconfiguration (SLAAC), Path MTU Discovery (PMTDU), Multicast Listener Discovery (MLD)
  • Transition Mechanisms and Scenarios
  • DNS, DHCPv6
  • Security, QoS, Routing Protocols (Short Overview)
  • Business Case, Planning, Methodologies, Best Practices

IPv6 Essentials Book

Price

€1395 excl. VAT

Location

Exclusive Networks bvba
A. Stocletlaan 202
2570 Duffel (Antwerp)

Trainer

This course is given by Thierry Van Steirteghem, Gold Certified IPv6 Trainer

Share this post
Sophos Certified Architect XG Firewall Training – 7-9 June 2017 @ Exclusive Networks
Jun 7 @ 09:00 – Jun 9 @ 17:00
Sophos Certified Architect  XG Firewall Training - 7-9 June 2017 @ Exclusive Networks | Duffel | Vlaanderen | Belgium

Course Description

Date: 7-9/06/2017
Duration: 3 days
Timing: every day from 9am to 5pm
Price:  €1555 excl. VAT

This course provides an in-depth study of Sophos XG Firewall, designed for experienced technical professionals who will be planning, installing, configuring and supporting deployments in production environments.

Objectives

On completion of this course, trainees will be able to:

  • Understand the components of the Sophos XG Firewall and how to configure them
  • Architect a solution for a customer’s environment and needs
  • Implement proof of concept (PoC) deployments with Sophos XG Firewall
  • Configure the components of Sophos XG Firewall according to best practice
  • Troubleshoot common issues on the Sophos XG Firewall

Pre-requisites:

Prior to attending this course, trainees should:

  • Complete the Sophos XG Firewall Certified Engineer course.
  • Have knowledge of networking to a CompTIA N+ level
  • Have knowledge of IT security to a CompTIA S+ level
  • Have experience configuring network security devices
  • Be able to troubleshoot and resolve issues in Windows networked environments
  • Have experience configuring and administering Linux/UNIX systems
If you are uncertain whether you meet the necessary prerequisites to attend this course, please email us at training@exclusive-networks.be and we will be happy to help.
[vc_empty_space]Download Full Course Description
Jun
12
Mon
HPE Aruba Sales Certification Training @ Exclusive Networks
Jun 12 @ 12:00 – 16:00
HPE Aruba Sales Certification Training @ Exclusive Networks | Duffel | Vlaanderen | Belgium

Aruba Sales Certification Training
With Certification Exam | Monday 12 June

Not an HPE Aruba Certified Reseller yet? We are offering a training session with included exam guidance to get your certifications! 

This certification will help you to describe, position, and recommend Aruba wired and wireless products and solutions. You will understand the opportunity with Aruba and be able to position Aruba products. You will learn how to expand your sales pipeline and have high value conversations on outcomes by understanding the current disruptions customers are dealing with. You’ll also be able to better understand the key issues facing customer’s management teams in a variety of different industries using the Business Value Framework resource.

This course and exam are appropriate for all customer-facing sales representatives. It is equally applicable and beneficial to inside sales reps as well as account executives. In addition, it is valuable for pre-sales teams working closely with the account teams to make sure that everybody understands the major shifts in the marketplace and the huge opportunities they present to sell business focused outcome-based solutions that address the new challenges facing our customers.

On the 12th of June, an Aruba Solutions Architect will give a quick rundown training at our offices. After the training, you will be guided in taking the web exam “HPE2-W01” which corresponds to the HPE Sales Certified – Aruba Products and Solutions [2017] certification. For those partner organizations with a Networking specialization, this certificate is a FY17 Partner Ready requirement. Additionally, each participant will also get 20 Knowledge Credits!

Prerequisites

You must be sure to have followed the free web course in your own time: “Selling Aruba Products and Solutions, Rev. 16.41 (Web Based Training 4:30 hours)”. The course includes understanding the opportunity with HPE Aruba, differentiating Aruba Mobile First solutions for the Digital Workplace, and positioning Aruba for:

  • Mobile First wired and wireless infrastructure solutions
  • Mobile First Platform and Technology Ecosystem
  • BYOD and IoT solutions
  • Location-based services
  • Wired and wireless SMB solutions

Price

€ 150 – will be refunded with your next Aruba order

Timing – Monday 12 June

12:00 Lunch
13:00 Training
14:30 Exam
15:30 Celebrations

Location 

Exclusive Networks Offices
A. Stocletlaan 202
2570 Duffel
Belgium

Jun
26
Mon
FireEye – Mandiant Malware Analysis Crash Course 26-27 June 2017 @ Exclusive Networks
Jun 26 @ 09:00 – Jun 27 @ 17:00
FireEye - Mandiant Malware Analysis Crash Course 26-27 June 2017 @ Exclusive Networks | Duffel | Vlaanderen | Belgium

Price:  €2000 excl. VAT
Date:
26 & 27 June
Duration: 2 Days
Timing:
9h00 – 17h00
Location: Exclusive Networks

OVERVIEW
This course provides a rapid introduction to the tools and methodologies used to perform malware analysis on executables found on Windows systems using a practical, hands-on approach. Students will learn how to find the functionality of a program by analyzing disassembly and by watching how it modifies a system and its resources as it runs in a debugger. Students will learn how to extract host and network-based indicators from a malicious program. Students will be taught about dynamic analysis and the Windows APIs most often used by malware authors. Each section is filled with in-class demonstrations and hands-on labs with real malware where the students practice what they have learned.

What You Will Learn:

  • Hands-on malware dissection
  • How to create a safe malware analysis environment
  • How to quickly extract network and host-based indicators
  • How to perform dynamic analysis using system monitoring utilities to capture the file system, registry, and network activity generated by malware
  • How to debug malware and modify control flow and logic of software
  • To analyze assembly code after a crash course in the Intel x86 assembly language
  • Windows internals and APIs
  • How to use key analysis tools like IDA Pro and OllyDbg
  • What to look for when analyzing a piece of malware
  • The art of malware analysis – not just running tools

WHO SHOULD TAKE THIS COURSE
Software developers, information security professionals, incident responders, computer security researchers, puzzle lovers, corporate investigators, or others requiring an understanding of how malware works and the steps and processes involved in performing malware analysis.

STUDENT REQUIREMENTS 

  • Excellent knowledge of computer and operating system fundamentals
  • Computer programming fundamentals and Windows Internals experience is highly recommended

WHAT STUDENTS SHOULD BRING
Students must bring their own laptop with VMware Workstation, Server, or Fusion installed (VMware Player is acceptable, but not recommended). Laptops should have at least 20GB of free space. A licensed copy of IDA Pro is highly recommended to participate in ALL labs, but the free version can be used in most cases.

WHAT STUDENTS WILL BE PROVIDED WITH

  • A student manual
  • Class handouts
  • Mandiant gear
  • lunch and drinks
Jun
27
Tue
F5 Partner Training Cloud for Sales & Presales @ Exclusive Networks
Jun 27 @ 12:30 – 16:00
F5 Partner Training Cloud for Sales & Presales @ Exclusive Networks | Duffel | Vlaanderen | Belgium

F5 Partner Training Cloud

for Sales & Presales |  Exclusive Networks – 27 June

Get up-to-date with the F5 cloud strategy and solutions during our Sales and Presales training exclusively for F5 Partners.

Topics

  • Why do we need a cloud strategy?
  • How F5’s mission meets your customers needs.
  • Private Cloud solutions
  • F5 solutions for orchestration
  • F5 solutions for containerized environments
  • Public Cloud
  • Hybrid Cloud
  • Using Colocation

Timing

12h30 – Welcome and lunch
13h30 – Start Training
16h00 – End

Location

Exclusive Networks
A. Stocletlaan 202
2570 Duffel (Antwerp)

Jun
28
Wed
FireEye – Mandiant Enterprise Incident Response Course 28-30 June 2017 @ Exclusive Networks
Jun 28 @ 09:00 – Jun 30 @ 17:00
FireEye - Mandiant Enterprise Incident Response Course 28-30 June 2017 @ Exclusive Networks | Duffel | Vlaanderen | Belgium

Price:  €3000 excl. VAT
Date:
28, 29 & 30 June
Duration: 3 Days
Timing:
9h00 – 17h00
Location: Exclusive Networks

OVERVIEW
This intensive three-day course is designed to teach the fundamental investigative techniques needed to respond to today’s landscape of threat actors and intrusion scenarios. Updated yearly to reflect the latest in forensics and intrusion techniques, the class is built upon a series of hands-on labs that highlight the phases of a targeted attack, key sources of attack evidence, and the forensic analysis knowledge required to analyze those sources. Students will learn how to conduct rapid triage on a system to determine if it is compromised, uncover evidence of initial attack vectors, recognize persistence mechanisms, develop indicators of compromise to further scope an incident, and much more.

COURSE DESCRIPTION
The course is composed of the following modules, with labs included throughout the instruction.

  • The Incident Response Process – An introduction to the targeted attack life cycle, initial attack vectors used by different threat actors, the stages of an effective incident response process, and remediation.
  • Acquiring Forensic Evidence – A basic overview of the most common forms of endpoint forensic evidence collection, and the benefits and limitations of each.
  • Introduction to Windows Evidence – An overview of the key sources of evidence that can be used to investigate a compromised Windows system, including the NTFS file system, Prefetch, web browser history, event logs, the registry, memory, and more.
  • Persistence
  • Investigating Lateral Movement – An in-depth analysis of how attackers move from system to system in a compromised Windows environment, the distinctions between network logons and interactive access, and the resulting sources of evidence on disk, in logs, and in the registry.
  • Hunting – How to apply the lessons learned from the previous modules to proactively investigate an entire environment, at-scale, for signs of compromise.I
  • Investigating Web Application Attacks –This module focuses on how to analyze web logs to recognize and interpret common attack techniques.

DOWNLOAD HERE FULL TRAINING DESCRIPTION


WHO SHOULD TAKE THIS COURSE
This is a fast-paced technical course that is designed to provide hands-on experience with investigating targeted attacks and the analysis steps required to triage breached systems. The content and pace is intended for students with some background in conducting forensic analysis, network traffic analysis, log analysis, security assessments and penetration testing, or security architecture and system administration duties. It is also well suited for those managing CIRT / incident response teams, or those in roles that require oversight of forensic analysis and other investigative tasks.
STUDENT REQUIREMENTS
Students must have a working understanding of the Windows operating system, file system, registry, and use of the command line. Familiarity with Active Directory and basic Windows security controls and common network protocols is also beneficial.

WHAT STUDENTS SHOULD BRING
Students must bring their own laptop with VMware Workstation, Server, or Fusion installed (VMware Player is acceptable, but not recommended). Laptops should have at least 20GB of free space.

A licensed copy of IDA Pro is highly recommended to participate in ALL labs, but the free version can be used in most cases.

WHAT STUDENTS WILL BE PROVIDED WITH

  • A student manual
  • Class handouts
  • Mandiant gear
  • lunch and drinks
Calendar