Skip to main content
Cybersecurity Training

Cybersecurity Training

Gain practical knowledge in cybersecurity to maintain and, in the event of a cyber-attack, recover mission-critical business data and applications. Find information and resources on topics such as data breaches, ransomware, data protection best practices, and application and infrastructure security.

 

Zero Trust Training

Zero Trust Training

Zero Trust – Overview

  • Learn the principles of Zero Trust, in addition to best practices for implementing enterprise-scale Zero Trust.

Implementing Zero Trust

  • This 24-hour course covers various design factors and strategies across an organization’s environment, with a focus on  Zero Trust tenets, pillars, capabilities, architectures, Zero Trust in networks, data centric Zero Trust, identity-based Zero Trust, hybrid Zero Trust, and Zero Trust in the cloud. 

 

 

Security Foundations Training

Available on-demand or instructor led, this training is designed to upskill IT Staff on critical cybersecurity skills related to their roles including instruction on risks, attack vectors, system hardening, zero trust and specific considerations for edge and cloud. Additionally, completion of this training will award students the Dell Proven Security Foundations Achievement

Security Foundations Training
Proven Professional Certifications

Proven Professional Certifications

Security – Achievement Skill

Security - NIST Skill Certification

Completing the Security Foundations course, including the Capstone assessment, plus passing the NIST Cybersecurity exam earns the learner the Dell Infrastructure Security badge. 

 

Featured Courses and Packages

Security Foundations

With a focus on people, process, and technology, the security foundations course covers a broad range of topics such as the NIST Cybersecurity Framework, ransomware, security hardening, as well as cloud and edge security. 

The course concludes with a capstone project to apply the covered security concepts and approaches to a scenario-based case study.

Delivery Type Length
Traditional Classroom 16 Hours
On Demand 10 Hours

PowerProtect Cyber Recovery Design and Administration

This course covers the concepts, features, management and design of PowerProtect Cyber Recovery and CyberSense. The course contains the steps to manage storage and applications and policies, copies, and sandboxes. The course also covers recovery operations with PPDM, NetWorker, and Avamar. Security considerations and additional administrative tasks are also covered.

Delivery Type Length
Traditional Classroom 16 Hours
Virtual Classroom 16 Hours

Cyber Recovery and Security – On Demand Package

This 30-hour package combines the Cyber Recovery training with our Security Foundations training as well as training on the NIST Cybersecurity Framework. Students who complete all training will additionally earn the Dell Security Foundations badge and be prepared to take the Proven Professional NIST Cybersecurity Framework 2023 certification exam.

The package includes the following courses:

  • Introduction to Cybersecurity Frameworks (1 hour)
  • Cybersecurity Tools and Processes (1 hour)
  • Cybersecurity Threats and Business Impacts (1 hour)
  • Zero Trust Overview (1 hour)
  • Understanding Ransomware (1 hour)
  • Identity and Access Management (1 hour)
  • IT and Cybersecurity Risk (1 hour)
  • Security Hardening Concepts (1 hour)
  • Security in the Cloud (1 hour)
  • Security at the Edge (1 hour)
  • Security Foundations Capstone (1 hour)
  • Implementing the NIST Cybersecurity Framework (5 hours)
  • Dell PowerProtect Cyber Recovery Concepts (1.5 hours)
  • Dell PowerProtect Cyber Recovery Features (2 hours)
  • Dell PowerProtect Cyber Recovery Administration (3 hours)
  • PowerProtect Cyber Recovery Troubleshooting (1.75 hours)
  • CyberSense for Dell PowerProtect Cyber Recovery Concepts (30 min.)
  • CyberSense for Dell PowerProtect Cyber Recovery Administration (2 hours)
  • CyberSense for Dell PowerProtect Cyber Recovery Implementation (2 hours)
  • Dell PowerProtect Cyber Recovery Design (2.5 hours)
Delivery Type Length
On Demand 30 Hours

 

 

Cybersecurity Resources