If you have a training need, we can meet it! Westcon Comstor Academy offers a wide range of vendor training options for individuals and partners. With our unparalleled range of technical programmes, we will help you expand your capabilities and keep you ahead of the competition. If you're new to certification, we understand that the various vendors and tracks can be overwhelming. We can help you choose a training path that best fits your interest, needs and goals, so if you're not sure what you need please contact us for further information or training advice.

Please click on the Individual Certification pages to see the list of training courses associated with your chosen track.

Refine Search

Courses

The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG.
The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. This an introductory course and is designed for students who are new to the ProxySG solution.
Palo Alto Networks® Traps™ Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Successful completion of this two-day, instructor-led course helps prepare the student to install Traps in basic configurations.
Trend Micro™ Deep Security 11.0 Training for Certified Professionals is a three-day, instructor-led training course where participants will learn how to use Trend Micro™ Deep Security for advanced hybrid-cloud security of physical, virtual and cloud-based servers. This course details the basic architecture of the Deep Security solution, deployment options, protection modules, policy configuration, and administration of the system. As part of the course, participants will install Deep Security Manager in a virtual lab environment, deploy Deep Security Agents on a variety of Windows Server computers, and configure protection on these computers. Best practices and troubleshooting details for successful implementation and long-term maintenance of the system are also discussed. This course is based on Deep Security 11.0. This course incorporates a variety of hands-on lab exercises allowing participants to put the lesson content into action. This course is taught by Trend Micro-certified trainers. Upon completion of this course, participants may complete the certification examination to obtain designation as a Trend Micro Certified Professional for Deep Security.
The Trend Micro Certified Professional designation for Complete User Protection is intended for consultants who work with Endpoint Security solutions in enterprise environments.
The Trend Micro Certified Professional designation for Complete User Protection is intended for consultants who work with Endpoint Security solutions in enterprise environments.