If you have a training need, we can meet it! Westcon Comstor Academy offers a wide range of vendor training options for individuals and partners. With our unparalleled range of technical programmes, we will help you expand your capabilities and keep you ahead of the competition. If you're new to certification, we understand that the various vendors and tracks can be overwhelming. We can help you choose a training path that best fits your interest, needs and goals, so if you're not sure what you need please contact us for further information or training advice.

Please click on the Individual Certification pages to see the list of training courses associated with your chosen track.

Refine Search

Courses

The Blue Coat Certified PacketShaper Professional (BCPSP) course is intended for IT professionals who wish to develop and master the skills to properly install, operate and configure PacketShaper
In the Blue Coat Certified Proxy Administrator (BCCPA) course intended for students who wish to master the fundamentals of Blue Coat ProxySG.
In the Blue Coat Certified Proxy Professional (BCCPP) course, you will learn to configure your Blue Coat Proxy appliance for high availability and multi-site deployments and advance policy features.
The Blue Coat Certified Security Analytics Administrator (BCSAA) course is intended for IT professionals who want to master the fundamentals of the Blue Coat Security Analytics solution
The Blue Coat Certified Security Analytics Professional (BCSAP) course designed for participants who want to learn how to use the Blue Coat Security Analytics platform to perform virtually any type of network-based monitoring and forensic analysis, including incident-response investigation, real-time situational awareness, and continuous monitoring for indicators of compromise (IOCs) and advanced persistent threats (APTs).
The Blue Coat SSL Visibility Appliance course is intended for students who wish to learn about configuring and managing the SSL Visibility Appliance.
The Blue Coat Web Application Reverse Proxy (WARP) course covers the concepts related to Reverse Proxy on the ProxySG.
Expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades.Validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
5-day advanced course teaches how to design, install, configure and manage Multi-Domain Security Management with Virtual System Extension.
GETTING A STEP AHEAD OF THE UNKNOWN Zero-day and advanced persistent threats use the element of surprise to bypass traditional security, making these threats difficult to protect against—and very popular with hackers. Traditional sandboxing was designed to help with these types of threats, but cybercriminals have evolved their techniques, creating evasive malware that can avoid detection by many sandbox solutions. As a result, many organizations find themselves taking reactive steps to counteract infection, rather than preventing it in the first place. To get ahead, enterprises need a multi-faceted prevention strategy that combines proactive protection that eliminates threats before they reach users, and state-of-the-art CPU-level exploit detection to expose even the most highly camouflaged threats.COURSE GOAL: Provide an understanding of basic concepts and skills necessary to configure and implement Check Point SandBlast technology
Check Point Security Administration R80 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades
Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades
Check Point Security Engineering is an advanced 3-day course that teaches how to effectively build, modify, deploy and troubleshoot Check Point Security systems on the Gaia OS.
Our most advanced technical 3-day course teaches how to use advanced commands to configure and troubleshoot Check Point Security Systems. Multiple hands-on lab exercises teach how to bring optimization techniques back to your workplace.
Develop a working knowledge of configuring and managing the Infoblox DNS Firewall solution. Understand the steps required to enable DNS Firewall. Learn how to create a local response policy zone (RPZ) and create and manage Block and Substitute Domain and IP address rules and Substitute record rules. Know how to validate your configured DNS Firewall solution is operating as desired.