Insoft has been serving IT community with official Cisco training offering since 2010. Find all the relevant information on Cisco training on this page.
Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.
Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.
The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.
The Fortinet Network Security Expert (NSE) program is an eight-level training and certification program to teach engineers of their network security for Fortinet FW skills and experience.
Insoft Services provides Microsoft training in EMEAR. We offer Microsoft technical training and certification courses that are led by world-class instructors.
We provide innovative and advanced support for designing, implementing and optimising IT solutions. Our client-base includes some of the largest Telcos globally.
Globally recognised team of certified experts helps you make a smoother transition with our pre-defined consultancy, installation and migration packages for a wide range of Fortinet products.
Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.
The Blue Coat Certified Security Analytics Professional (BCSAP) course covers:
Theory of Operation
File Extraction
Data Enrichment
Threat BLADES
Kill Chain Analysis
To Look for Indicators of Compromise (IOCs)
Integration
The Virtual File System (VFS)
After completing the BCSAP course, you will be able to:
Map high-level operational functions to internal system modules and identify how data flows through the system
Use reports and extractions to find and analyze relevant data to solve problems
Use the Security Analytics Platform for incident-response
Use comparisons and advanced display filters to narrow search results
Apply kill-chain analysis to discover and describe indicators of compromise
Participants should have a sound understanding of the OSI reference model and common networking protocols, and how those protocols make connections, keep state, and transfer data, along with basic experience with network packet and flow analysis, including the use of PCAP files, TCP dump, and Wireshark.
Basic to advanced knowledge of best practices for incident response and continuous monitoring will provide a significant advantage.
Participants should have a sound understanding of the OSI reference model and common networking protocols, and how those protocols make connections, keep state, and transfer data, along with basic experience with network packet and flow analysis, including the use of PCAP files, TCP dump, and Wireshark.
Basic to advanced knowledge of best practices for incident response and continuous monitoring will provide a significant advantage.