If you have a training need, we can meet it! Westcon Comstor Academy offers a wide range of vendor training options for individuals and partners. With our unparalleled range of technical programmes, we will help you expand your capabilities and keep you ahead of the competition. If you're new to certification, we understand that the various vendors and tracks can be overwhelming. We can help you choose a training path that best fits your interest, needs and goals, so if you're not sure what you need please contact us for further information or training advice.

Please click on the Individual Certification pages to see the list of training courses associated with your chosen track.

Refine Search

Courses

The Blue Coat Certified PacketShaper Professional (BCPSP) course is intended for IT professionals who wish to develop and master the skills to properly install, operate and configure PacketShaper
Students will learn methods to properly configure, deploy, manage and troubleshoot their Extreme Networks switching and routing environments using the Extreme Networks operating systems (XOS) CLI.
Expert users and resellers who need to perform advanced deployment configurations of Check Point Software Blades.Validate your understanding and skills necessary to configure and optimally manage Check Point Next Generation Firewalls.
This class continues the Art of Web Hacking series The class covers a wide range of offensive hacking techniques. The curriculum was written by real penetration testers with a world-wide reputation (BlackHat, AppSec, OWASP, Defcon). The Advanced Infrastructure Hacking class is designed for those who want to enrich their knowledge. The fast-paced class teaches: Hacking techniques to compromise operating systems and networking devices Advanced penetration techniques to achieve exploitation Hacking domain controllers to local root, VLAN hopping and VoIP hacking
This fastpaced class gives attendees an insight into advanced AppSec topics. The class curriculum is split into two: 3 days of Server Side Flaws. 2 days of Client Side Flaws
The ideal introductory/intermediate training class designed to teach the fundamentals of what pen testing is all about. This hands-on training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focuses on what is really needed when conducting a penetration test. Whilst a variety of tools are used, they are the key tools that should be in any penetration tester’s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career.
This curriculum introduces you to Web Application Hacking.Practical focusLearn how web application security flaws are foundDiscover leading industry standards and approachesUse this foundation to enhance your knowledgePrepare for more advanced web application topics
GETTING A STEP AHEAD OF THE UNKNOWN Zero-day and advanced persistent threats use the element of surprise to bypass traditional security, making these threats difficult to protect against—and very popular with hackers. Traditional sandboxing was designed to help with these types of threats, but cybercriminals have evolved their techniques, creating evasive malware that can avoid detection by many sandbox solutions. As a result, many organizations find themselves taking reactive steps to counteract infection, rather than preventing it in the first place. To get ahead, enterprises need a multi-faceted prevention strategy that combines proactive protection that eliminates threats before they reach users, and state-of-the-art CPU-level exploit detection to expose even the most highly camouflaged threats.COURSE GOAL: Provide an understanding of basic concepts and skills necessary to configure and implement Check Point SandBlast technology
Check Point Security Administration R80 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades
Check Point Security Administration R77 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades
Check Point Security Engineering is an advanced 3-day course that teaches how to effectively build, modify, deploy and troubleshoot Check Point Security systems on the Gaia OS.
Our most advanced technical 3-day course teaches how to use advanced commands to configure and troubleshoot Check Point Security Systems. Multiple hands-on lab exercises teach how to bring optimization techniques back to your workplace.
Establish in-depth working knowledge of how to configure and administer Infoblox appliances and the Infoblox Grid and manage the DNS and DHCP protocols in Infoblox. Advanced topics include DNS Anycast, Dynamic DNS, and reporting.
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
EC-Council releases the most advanced Computer Forensic Investigation program in the world. CHFIv8 presents a detailed methodological approach to computer forensics and evidence analysis. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various forensic investigation techniques and standard tools necessary to successfully carry-out a computer forensic investigation.