CREST Registered Tester (CRT) - Kun 4 dage

Hvorfor

Hvad siger vores kunder?

Absolut topkarakter for udførelse, inspiration og formidling af budskaber - Top klasse!
John Nedergaard, KMD - Microsoft Solution Selling (3 dage), 28/2/2011 til 1/3/2011

Her er 4 gode grunde til at du skal tage Firebrand’s træning til CREST’s Registered Tester eksamen:

Se Hvordan Vi Hjælper Dig Med at Få Nye Færdigheder Hurtigt

  1. Du bliver CRT uddannet hurtigere. Du lærer mere på vores 4 dages accelererede kursus og får mindst 12 timers daglig uddannelse i et distraktionsfrit miljø.
  2. Dit CRT kursus er alt-inklusiv. Du får en gennemskuelig pris, der dækker alle kursusmaterialer, overnatning og forplejning. Du skal ikke tænke på andet end at lære.
  3. Få masser af hands-on CRT erfaring. Din instruktør er ekspert, og træner dig ud fra accelererede metoder, så du lærer hurtigere og har de bedste muligheder for at tage hjem med de nye færdigheder du har brug for.
  4. Tag CRT hos en prisvindende uddannelsesleverandør. Vi har vundet adskillige udmærkelser heriblandt Microsofts "Årets Learning Partner" hele fire gange i træk og to Børsen Gazelle priser. Firebrand er din hurtigste vej til uddannelse, og vi har sparet 72.589 deltagere for mere end en million spildte timer siden 2001.

Er du klar til kurset? Tag en GRATIS test som hjælper dig med at bedømme din nuværende viden.

Hvad

A: Soft Skills and Assessment Management

  • A1 Engagement Lifecycle
    • Benefits and utility of penetration testing to the client. Structure of penetration testing, including the relevant processes and procedures. Concepts of infrastructure testing and application testing, including black box and white box formats. Project closure and debrief
  • A2 Law & Compliance
    • Knowledge of pertinent UK legal issues: -Computer Misuse Act 1990 -Human Rights Act 1998 -Data Protection Act 1998 - Police and Justice Act 2006 Impact of this legislation on penetration testing activities. Awareness of sector-specific regulatory issues.
  • A3 Scoping
    • Understanding client requirements. Scoping project to fulfil client requirements. Accurate timescale scoping. Resource planning.
  • A4 Understanding Explaining and Managing Risk
    • Knowledge of additional risks that penetration testing can present. Levels of risk relating to penetration testing, the usual outcomes of such risks materialising and how to mitigate the risks. Effective planning for potential DoS conditions.
  • A5 Record Keeping, Interim Reporting & Final Results
  • Understanding reporting requirements. Understanding the importance of accurate and structured record keeping during the engagement.

B: Core Technical Skills

  • B1 IP Protocols
    • IP protocols: IPv4 and IPv6, TCP, UDP and ICMP. Awareness that other IP protocols exist.
  • B2 Network Architectures
    • Varying networks types that could be encountered during a penetration test: - CAT 5 / Fibre - 10/100/1000baseT - Token ring - Wireless (802.11) Security implications of shared media, switched media and VLANs.
  • B4 Network Mapping & Target Identification
    • Analysis of output from tools used to map the route between the engagement point and a number of targets. Network sweeping techniques to prioritise a target list and the potential for false negatives.
  • B5 Interpreting Tool Output
    • Interpreting output from port scanners, network sniffers and other network enumeration tools.
  • B6 Filtering Avoidance Techniques
    • The importance of egress and ingress filtering, including the risks associated with outbound connections.
  • B8 OS Fingerprinting Remote operating system fingerprinting; active and passive techniques.
  • B9 Application Fingerprinting and Evaluating Unknown Services
    • Determining server types and network application versions from application banners. Evaluation of responsive but unknown network applications.
  • B10 Network Access Control Analysis
    • Reviewing firewall rule bases and network access control lists.
  • B11 Cryptography Differences between encryption and encoding. Symmetric / asymmetric encryption Encryption algorithms: DES, 3DES, AES, RSA, RC4. Hashes: SHA1 and MD5 Message Integrity codes: HMAC
  • B12 Applications of Cryptography
    • SSL, IPsec, SSH, PGP Common wireless (802.11) encryption protocols: WEP, WPA, TKIP
  • B13 File System Permissions
    • File permission attributes within Unix and Windows file systems and their security implications. Analysing registry ACLs.
  • B14 Audit Techniques Listing processes and their associated network sockets (if any). Assessing patch levels. Finding interesting files.

C: Background Information Gathering & Open Source

  • C1 Registration Records
    • Information contained within IP and domain registries (WHOIS).
  • C2 Domain Name Server (DNS)
    • DNS queries and responses DNS zone transfers Structure, interpretation and analysis of DNS records: - SOA - MX -TXT- A -NS -PTR - HINFO - CNAME
  • C3 Customer Web Site Analysis
    • Analysis of information from a target web site, both from displayed content and from within the HTML source.
  • C4 Google Hacking and Web Enumeration
    • Effective use of search engines and other public data sources to gain information about a target.
  • C5 NNTP Newsgroups and Mailing Lists
    • Searching newsgroups or mailing lists for useful information about a target.
  • C6 Information Leakage from Mail & News Headers
    • Analysing news group and e-mail headers to identify internal system information.

D: Networking Equipment

  • D1 Management Protocols
    • Weaknesses in the protocols commonly used for the remote management of devices: - Telnet - Web based protocols - SSH - SNMP (covering network information enumeration and common attacks against Cisco configurations) - TFTP - Cisco Reverse Telnet - NTP
  • D2 Network Traffic Analysis
    • Techniques for local network traffic analysis. Analysis of network traffic stored in PCAP files.
  • D3 Networking Protocols
    • Security issues relating to the networking protocols: - ARP - DHCP - CDP - HSRP - VRRP - VTP - STP - TACACS+
  • D4 IPSec Enumeration and fingerprinting of devices running IPSec services.
  • D5 VoIP Enumeration and fingerprinting of devices running VoIP services. Knowledge of the SIP protocol.
  • D6 Wireless Enumeration and fingerprinting of devices running Wireless (802.11) services. Knowledge of various options for encryption and authentication, and the relative methods of each. - WEP - TKIP - WPA/WPA2 - EAP/LEAP/PEAP
  • D7 Configuration Analysis
    • Analysing configuration files from the following types of Cisco equipment:
      • Routers
      • Switches Interpreting the configuration of other manufacturers’ devices.

E: Microsoft Windows Security Assessment

  • E1 Domain Reconnaissance
    • Identifying domains/workgroups and domain membership within the target network. Identifying key servers within the target domains. Identifying and analysing internal browse lists. Identifying and analysing accessible SMB shares
  • E2 User Enumeration Identifying user accounts on target systems and do mains using NetBIOS, SNMP and LDAP.
  • E3 Active Directory Active Directory Roles (Global Catalogue, Master Browser, FSMO) Reliance of AD on DNS and LDAP Group Policy (Local Security Policy)
  • E4 Windows Passwords
    • Password policies (complexity, lockout policies) Account Brute Forcing Hash Storage (merits of LANMAN, NTLMv1 / v2) Offline Password Analysis (rainbow tables / hash brute forcing)
  • E5 Windows Vulnerabilities
    • Knowledge of remote windows vulnerabilities, particularly those for which robust exploit code exists in the public domain. Knowledge of local windows privilege escalation vulnerabilities and techniques. Knowledge of common post exploitation activities:
      • Obtain password hashes, both from the local SAM and cached credentials
      • Obtaining locally-stored clear-text passwords
      • Crack password hashes
      • Check patch levels
      • Derive list of missing security patches
      • Reversion to previous state
    • ID Skill Details How Examined CCT ACE CCT ICE CRT
  • E6 Windows Patch Management Strategies
    • Knowledge of common windows patch management strategies: - SMS - SUS - WSUS - MBSA
  • E7 Desktop Lockdown
    • Knowledge and understanding of techniques to break out of a locked down Windows desktop / Citrix environment. Privilege escalation techniques.
  • E8 Exchange Knowledge of common attack vectors for Microsoft Exchange Server.
  • E9 Common Windows Applications
    • Knowledge of significant vulnerabilities in common windows applications for which there is public exploit code available.

F: Unix Security Assessment

  • F1 User enumeration Discovery of valid usernames from network services commonly running by default: - rusers -rwho - SMTP - finger Understand how finger daemon derives the information that it returns, and hence how it can be abused.
  • F2 Unix vulnerabilities
    • Recent or commonly-found Solaris vulnerabilities, and in particular those for which there is exploit code in the public domain. Recent or commonly-found Linux vulnerabilities, and in particular those for which there is exploit code in the public domain. Use of remote exploit code and local exploit code to gain root access to target host Common post-exploitation activities:
      • exfiltrate password hashes
      • crack password hashes
      • check patch levels
      • derive list of missing security patches
      • reversion to previous state
  • F3 FTP FTP access control Anonymous access to FTP servers Risks of allowing write access to anonymous users.
  • F4 Sendmail / SMTP
    • Valid username discovery via EXPN and VRFY Awareness of recent Sendmail vulnerabilities; ability to exploit them if possible Mail relaying
  • F5 Network File System (NFS)
    • NFS security: host level (exports restricted to particular hosts) and file level (by UID and GID). Root squashing, nosuid and noexec options. File access through UID and GID manipulation.
  • F6 R* services Berkeley r* service: - access control (/etc/hosts.equiv and .rhosts) - trust relationships Impact of poorly-configured trust relationships.
  • F7 X11 X Windows security and configuration; hostbased vs. user-based access control.
  • F8 RPC services RPC service enumeration Common RPC services Recent or commonly-found RPC service vulnerabilities.
  • F9 SSH Identify the types and versions of SSH software in use Securing SSH Versions 1 and 2 of the SSH protocol Authentication mechanisms within SSH

G: Web Technologies

  • G1 Web Server Operation
    • How a web server functions in terms of the client/server architecture. Concepts of virtual hosting and web proxies.
  • G2 Web Servers & their Flaws
    • Common web servers and their fundamental differences and vulnerabilities associated with them: - IIS - Apache (and variants)
  • G3 Web Enterprise Architectures
    • Design of tiered architectures. The concepts of logical and physical separation. Differences between presentation, application and database layers.
  • G4 Web Protocols Web protocols: HTTP, HTTPS, SOAP. All HTTP web methods and response codes. HTTP Header Fields relating to security features
  • G5 Web Mark-up Languages
    • Web mark-up languages: HTML and XML. MC

H: Web Testing Methodologies

  • ID Skill Details How Examined CCT ACE CCT ICE CRT
  • H1 Web Application Reconnaissance
    • Benefits of performing application reconnaissance. Discovering the structure of web applications. Methods to identify the use of application components defined in G1 to G9.
  • H2 Threat Modelling and Attack Vectors
    • Simple threat modelling based on customer perception of risk. Relate functionality offered by the application to potential attack vectors.
  • H3 Information Gathering from Web Mark-up
    • Examples of the type of information available in web page source that may prove useful to an attacker: - Hidden Form Fields -Database Connection Strings
      • Credentials
      • Developer Comments
      • Other included files
      • Authenticated-only URLs
  • H4 Authentication Mechanisms
    • Common pitfalls associated with the design and implementation of application authentication mechanisms.
  • H5 Authorisation Mechanisms
    • Common pitfalls associated with the design and implementation of application authorisation mechanisms.
  • H6 Input Validation The importance of input validation as part of a defensive coding strategy. How input validation can be implemented and the differences between white listing, black listing and data sanitisation.
  • H7 Application Fuzzing
    • Fuzzing and its relevance within web-app penetration testing. The use of fuzz strings and their potential effects. Potential dangers of fuzzing web applications.
  • H8 Information Disclosure in Error Messages
    • How error messages may indicate or disclose useful information.
  • H9 Use of Cross Site Scripting Attacks
    • Potential implications of a cross site scripting vulnerability. Ways in which the technique can be used to benefit an attacker.
  • H10 Use of Injection Attacks
    • Potential implications of injection vulnerabilities: -SQL injection - LDAP injection - Code injection - XML injection Ways in which these techniques can be used to benefit an attacker.
  • H11 Session Handling Common pitfalls associated with the design and implementation of session handling mechanisms.
  • H12 Encryption Common techniques used for encrypting data in transit and data at rest, either on the client or server side. Identification and exploitation of Encoded values (e.g. Base64) and Identification and exploitation of Cryptographic values (e.g. MD5 hashes) Identification of common SSL vulnerabilities
  • H13 Source Code Review
    • Common techniques for identifying and reviewing deficiencies in the areas of security.

I: Web Testing Techniques

  • I1 Web Site Structure Discovery
    • Spidering tools and their relevance in a web application test for discovering linked content. Forced browsing techniques to discover default or unlinked content. -Identification of functionality within client-side code
  • I2 Cross Site Scripting Attacks
    • Arbitrary JavaScript execution. Using Cross Site Scripting techniques to obtain sensitive information from other users. Phishing techniques.
  • I3 SQL Injection Determine the existence of an SQL injection condition in a web application. Determine the existence of a blind SQL injection condition in a web application. Exploit SQL injection to enumerate the database and its structure. Exploit SQL injection to execute commands on the target server.
  • I6 Parameter Manipulation
    • Parameter manipulation techniques, particularly the use of client side proxies.
  • I8 Directory Traversal
    • Identifying directory traversal vulnerabilities within applications.
  • I9 File Uploads Identifying common vulnerabilities with file upload capabilities within applications.
  • I10 Code Injection Investigate and exploitation of code injection vulnerabilities within web applications

J: Databases

  • J1 Microsoft SQL Server
    • Knowledge of common attack vectors for Microsoft SQL Server. Understanding of privilege escalation and attack techniques for a system compromised via database connections.
  • J2 Oracle RDBMS Derivation of version and patch information from hosts running Oracle software. Default Oracle accounts.
  • J3 Web / App / Database Connectivity
    • Common databases (MS SQL server, Oracle, MySQL and Access) and the connection and authentication methods used by web applications.

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

Firebrand's training will prepare you to sit the CREST Registered Penetration Tester exam which is in two parts:

  • A practical assessment where the candidate will be expected to find known vulnerabilities across common network, application and database technologies
  • A multiple choice section aimed at assessing the candidates technical knowledge. In order to pass the examination, the candidate must pass both sections of the exam.

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

Firebrand Training tilbyder kvalificerede uddannelses- og certificeringsprogram som inkluderer alt, er enkelt for kunden og udviklet med fokus på de specifikke behov som vores deltagere har. Vi sørger for, at alle detaljer er på plads, så du kun skal fokusere på dine indlærings- og certificeringsmål.

Vores kursus- og certificeringsprogram inkluderer alt med;

  • Praktisk orienteret undervisning som anvender vores Præsentation|Øvelse|Diskussion metodik.
  • Omfattende kursusmaterialer og labmanualer – vi tilpasser traditionelle kursusmaterialer til de specifikke krav for accelereret indlæring.
  • Et helt igennem instruktørstyret program med 24 timers adgang til både undervisningslokale og instruktøren.
  • Eksamens vouchers og testning på kursuscenteret.
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Vores certificeringsgaranti som indebærer, at du har ret til at komme tilbage til kurset så mange gange du ønsker, indenfor de første 12 måneder, indtil du består eksamen. Det eneste du skal betale er eventuelle nye test- og logiomkostninger.

Det hele er inkluderet! Du får en alt-inklusiv kursuspakke, som er målrettet til dine behov. Vi tager os af enhver detalje, så det eneste du skal fokusere på er dine lærings- og certificeringsmål.

  • Transport til/fra specifikke afhentningssteder
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Intensiv Hands-on uddannelse med vores unikke (Lecture | Lab | Review)TM metode
  • Omfattende kursusmaterialer og labmanualer
  • Et helt igennem instruktørstyret program
  • 24 timers adgang til både undervisningslokale og instruktøren
  • Samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Certificeringsgaranti

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

Before sitting the CREST Registered Penetration Tester exam, it is recommended that you have at least 6,000 hours (three years or more) of relevant and frequent experience in penetration testing.

Er du klar til dit Firebrand Kursus?

Vi interviewer alle potentielle deltagere angående deres baggrund, uddannelser, certificeringer og personlig indstilling. Hvis du kommer igennem denne screeningsprocedure, betyder det, at du har rigtig gode chancer for at bestå.

Firebrand Training tilbyder et ambitiøst uddannelsesmiljø, som forudsætter at du dedikerer dig til kurset. Ovenstående forkundskaber er vejledende; mange deltagere med mindre erfaring, men med en anden baggrund eller færdigheder, har haft succes med accelereret uddannelse hos Firebrand Training.

Hvis du funderer på hvorvidt du opfylder de anbefalede forkundskaber, er du meget velkommen til at ringe til os på 78 79 16 53 og tale med en af vores uddannelsesrådgivere, som kan hjælpe dig.

Interesseret? Se vores priser her eller ring 78 79 16 53

Hvornår

Hvornår vil du tage dit accelererede kursus?

CREST - Registered Tester (CRT)

Starter

Slutter

Tilgængelighed

Tilmelding

7/10/2019 (Mandag)

10/10/2019 (Torsdag)

Tilgængelige pladser

Tilmelding

Kundereferencer

Vi har uddannet over 72.589 personer i løbet af 12 år. Vi har bedt dem alle om at bedømme vores accelererede kurser. Aktuelt har 96,74% sagt, at Firebrand oversteg deres forventninger:

"Fantastic instructor. Professional, enthusiastic, and knows the subject inside out. An absolute pleasure to learn from. "
J.M.J., Program Planning Professionals Ltd. - CREST Practitioner Security Analyst (CPSA) (4 dage) (8/10/2018 til 11/10/2018)

"The instructor we had was very knowledgeable and approachable and willing to delve further into detail (time permitting). Course content was very informative and additional reading material is very helpful so I know where to concentrate my efforts."
Philip Freeman, Xpertex. - CREST Practitioner Security Analyst (CPSA) (4 dage) (8/10/2018 til 11/10/2018)

"Excellent training - trainers and venue ideally setup to support your learning needs."
Chris Cobb, Xpertex ltd. - CREST Practitioner Security Analyst (CPSA) (4 dage) (8/10/2018 til 11/10/2018)

"Et intensivt og meget udbytterigt kursus. Et behageligt og uhøjtideligt undervisningsmiljø med repræsentation af forskellige brancher, hvilket giver et højt udbytte."
Wickie Andersen, Albjergs Maskintec A/S. - Microsoft Dynamics NAV 2016 Financials (5 dage) (27/6/2016 til 1/7/2016)

"Relevant, klart og godt!"
Anders von der Recke, Otaku IT. - Microsoft Dynamics AX 7 What’s New – Technical (2 dage) (22/6/2016 til 23/6/2016)

"En perfekt måde og modtage intensiv målrettet træning på, uden at blive båret igennem. Det er hårdt men relevant."
Jesper Munkholm. - Microsoft MCSD: Azure Solutions Architect (9 dage) (23/5/2016 til 29/5/2016)

"Det var benhårdt, men jeg lærte utroligt meget på kort tid."
Kåre Schmidt, Also A/S. - Microsoft Implementing Microsoft Azure Infrastructure Solutions (3 dage) (26/5/2016 til 28/5/2016)

"Dygtig instructør med god erfaring"
Ralph Kristensen, Nissens A/S. - Microsoft Dynamics AX 2012 R3 Financials (5 dage) (23/5/2016 til 27/5/2016)

"Det er et kort og intensivt forløb, men man lærer utrolig meget. Det korte forløb gør det nemmere at forstå koncepterne, fordi man lærer det hele på én gang, og derved kan se det i sammenhæng."
Daniel Madsen, KMD. - Microsoft Developing Microsoft Azure Solutions (4 dage) (23/5/2016 til 25/5/2016)

"Very immersive, great way to soak up all the knowledge needed to pass my certification test."
Hannes Lindbeck, Sogeti. - Project Management Institute (PMI)® Project Management Professional (PMP)® (5 dage) (17/5/2016 til 21/5/2016)

"Very immersive, great way to soak up all the knowledge needed to pass my certification test."
Hannes Lindbeck, Sogeti. - Project Management Institute (PMI)® Project Management Professional (PMP)® (5 dage) (17/5/2016 til 21/5/2016)

"Serves its purpose to train project managers to become certified."
Anonym - Project Management Institute (PMI)® Project Management Professional (PMP)® (5 dage) (17/5/2016 til 21/5/2016)

"Serves its purpose to train project managers to become certified."
Anonym - Project Management Institute (PMI)® Project Management Professional (PMP)® (5 dage) (17/5/2016 til 21/5/2016)

"Meget professionel undervisning i behagelige omgivelser. "
Poul Vognstrup, Norriq. - Microsoft Dynamics NAV 2016 Developer (6 dage) (9/5/2016 til 14/5/2016)

"very relevant course content and great trainer"
Anonym - ISACA CISM Certificering (4 dage) (9/5/2016 til 12/5/2016)

"You will learn a lot and meet other in your area of expertise - highly recommended and Firebrand Isaca competence provider"
Christian Yng, Novo Nordisk. - ISACA CISM Certificering (4 dage) (9/5/2016 til 12/5/2016)

"Very good"
Anonym - ISACA CISM Certificering (4 dage) (9/5/2016 til 12/5/2016)

"Fine course, in nice surrounding"
Carsten Eismark. - ISACA CISM Certificering (4 dage) (9/5/2016 til 12/5/2016)

"Fokuseret, skarp til benet og super effektivt"
Karsten Holm, Soft Design A/S. - The Open Group TOGAF® 9.2 certified training (Level 1&2) (3 dage)

"Et meget intensivt kursus, hvor man lærer rigtig meget på de 9 dage. Men også et meget hårdt kursus at komme igennem, men kan absolut anbefales. "
Brian Bach Rasmussen. - Microsoft MCSA: Windows Server 2012 R2 (9 dage) (9/4/2016 til 17/4/2016)

"Godt kursus, gode faciliteter og god forplejning."
Ib Andersen, BO-VEST. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Godt kursus, dejligt sted og god mad."
Ib Andersen, BO-VEST. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"Der har ikke været tid til at være social, da alt har været studie, men det hele har været interessant."
Ebbe Vestergaard. - EC-Council Certified Ethical Hacker (CEH) (5 dage) (11/4/2016 til 15/4/2016)

"The firebrand course was intense and quick, many hours of information and knowledge."
Morten Lehani Neergaard, Vestforbraending I/S. - Cisco ICND1 (CCENT) (4 dage) (4/4/2016 til 6/4/2016)

"Jeg synes kurset har været meget professionelt og har været meget lærerig og inspirerende."
Anonym - Microsoft Dynamics AX 2012 Installation & Configuration (3 dage) (30/3/2016 til 1/4/2016)

"Meget intens kursus. Super gode underviser/trainer"
Renu Suri, EG A/S. - Microsoft Dynamics CRM 2015 (8 dage) (13/3/2016 til 20/3/2016)

"Koncentreret og intens læring. Alt det nye information er friskt og bliver ikke glemt, af at komme hjem i hverdagen. Man får en virkelig bred forståelse af emnet, da instruktøren kan forklare alt i dybe detaljer."
Mathias Fjord Christensen, EG. - Microsoft Dynamics AX 2012 Development - Introduction (4 dage) (6/3/2016 til 9/3/2016)

"Super fedt kursus med meget viden på ultra kort tid. Man får godt nok ikke meget søvn og der er ingen fritid - men miljøet giver inspiration til virkelig at ville lære. Instruktøren er en af de mest kloge og sjove jeg nogensinde har mødt. Måden kurset bliver leveret er inspirerende og lærerig. Dog vil jeg helt klart anbefale at man har øvet sig en del hjemmefra og måske læst bøgerne inden kurset. "
Thomas Hansen , Multi-Wing International A/S. - Microsoft MCSA: Windows Server 2012 R2 (9 dage) (6/2/2016 til 14/2/2016)

"Rigtig god service, meget flinke ansatte."
Andreas Liunge, Fujitsu. - The Open Group TOGAF® 9.2 certified training (Level 1&2) (3 dage) (18/1/2016 til 20/1/2016)

"God instruktør som havde stor forståelse af materialet. "
J.J., Nordea. - The Open Group TOGAF® 9.2 certified training (Level 1&2) (3 dage) (18/1/2016 til 20/1/2016)

"Jeg deltog kun på den midterste del (486). Det var meget udbytterigt, men samtidig virkeligt hårdt med 11 timers undervisning og efterfølgende selvstudie hver dag."
Casper WandahlLiper , ExpandIT Mobile. - Microsoft MCSD: Web Applications (9 dage) (21/11/2015 til 29/11/2015)

"Gode omgivelser og venligt personale, som har været rigtig rart mens dette hårde kursus har stået på."
Anonym, Pandora A/S - Microsoft Dynamics AX 2012 R3 Trade & Logistics (5 dage) (9/11/2015 til 13/11/2015)

"Perfect for learning!"
Anonym - (ISC)2 CISSP (6 dage) (2/11/2015 til 8/11/2015)

"Fantastiske omgivelser, god support stab, gode undervisningsfaciliteter, gode vaerelser og fantastisk instruktor. Sundsgaarden med fantastisk udsigt til Danmark"
Leif Andersen . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Tekniknørderi med andre nørder i en hel uge er balsam for sjælen :)"
Silas Hansen . - EC-Council Certified Ethical Hacker (CEH) (5 dage) (2/11/2015 til 6/11/2015)

"Godt og intensivt kursus med dygtig instruktør. Godt kursus sted i dejlige omgivelser og gode muligheder for at fordybe sig. Kan kun varmt anbefale dette..."
Anonym - Cisco CCNA (Routing & Switching) (7 dage) (26/10/2015 til 31/10/2015)

"En god instructor med en masse erfaring han kunne dele af. Vil anbefale ham til fremtidige Sure Step kurser"
A.H. - Microsoft Dynamics Sure Step 2012 (2 dage) (29/10/2015 til 30/10/2015)

"Det er intenst og meget godt"
Anonym - Microsoft Dynamics Sure Step 2012 (2 dage) (29/10/2015 til 30/10/2015)

"Excellent !! Super træning, super instruktør der hele vejen igennem holdt et godt tempo med mange informationer"
Anonym, EG A/S - Microsoft Dynamics CRM Developer 2015 (5 dage) (19/10/2015 til 23/10/2015)

"Fine vaerelsesforhold. Middel bespisning. Gode undervisnings forhold. Fantastisk god underviser, let at forstaa og godt inde i stoffet. "
Anonym, Atos - Microsoft MCTS BizTalk Server 2010 (4 dage) (19/10/2015 til 22/10/2015)

"Super kursus, alle kom til Firebrand med samme vilje til at lære tingene! "
Danny Henriksen , Jansson Kommunikation A/S, Odense, Denmark. - Microsoft MCSA: Windows Server 2012 R2 (9 dage) (19/9/2015 til 27/9/2015)

"God og intensiv undervisning med en velforberedt og kompetent instruktør "
Winnie Reinert , INUIT. - Microsoft Dynamics NAV 2015 Financials (6 dage) (7/9/2015 til 12/9/2015)

"Alt gik som smurt selvom jeg var sent ude."
Steen Bjørn , ProActive. - Microsoft Dynamics Sure Step 2012 (2 dage) (16/6/2015 til 17/6/2015)

"Meget professionelt - undervisning og ophold"
Bettina Toft , MW Data A/S. - Microsoft Dynamics AX 2012 R3 Trade & Logistics (5 dage) (20/4/2015 til 24/4/2015)

"Man får ro til at få yderligere indsigt I løsningen. Også selvom man arbejder med det I hverdagen. Det giver en mulighed for at se yderligere løsningsmuligheder, som man ikke havde haft øjnene op for før. "
Anonym - Microsoft Dynamics CRM Online 2015 (7 dage) (13/4/2015 til 19/4/2015)

"Godt kursus, god instruktør. Er klar til at skulle hjem og implementere i virksomheden."
Christina Brandt , KRM AG. - Microsoft Dynamics AX 2012 HRM (3 dage) (23/3/2015 til 25/3/2015)

"Den intensive træning man får hos Firebrand er perfekt for att lære materiale hurtigt. Faciliteterne er også helt i top."
Brian Petersen . - Cisco CCNA (Routing & Switching) (7 dage) (16/3/2015 til 21/3/2015)

"Supergod og intensiv træning"
Karin Jepsen, MW Data. - Microsoft Dynamics Sure Step 2012 (2 dage) (16/3/2015 til 17/3/2015)

"Rigtig godt kursus, og forplejningen er helt i orden så man bare kan koncentrere sig om materialet."
J.K.C. - Microsoft Dynamics AX 2012 R3 Financials (5 dage) (16/2/2015 til 20/2/2015)

"Top koncept!!! Men man skal indstille sig på at det er hårdt. Men alt i alt en super lærerig, sjov og fornøjelig oplevelse, som jeg meget gerne gentager - flere gange!!!"
Anonym, Koncern IT - Microsoft MCSA: Windows Server 2012 R2 (9 dage) (7/2/2015 til 15/2/2015)

Se priser