Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
SIP deep dive
In today's Unified Communications networks, SIP protocol is used whether for communication between endpoints, but also between different server systems. In this course, the participants will 'dive' into theoretical ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
L1 (Foundation) TOGAF 9.2
The course is focused on detail explanation of TOGAF – the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...
Configuring Cisco Unified Computing System
The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System (Cisco UCS) B-series blade servers, Cisco UCS C-Series, and S-Series ...
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Understanding Cisco Wireless Foundations
The course gives students the knowledge and skills to position, plan, implement, operate and manage Cisco Wireless LAN (WLAN) network. Students learn how to design, install, configure, monitor and conduct ...
Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
Configuring VoIP on Cisco Products
This 4-day seminar contains theoretical as well as practical sections, that will present to the participants how analog voice networks, VoIP networks and Video communication do function.
L1 (Foundation) for ArchiMate 3.1
The course guides you through the ArchiMate modeling language – standard for Enterprise architecture – explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
Implementing and Operating Cisco Collab. Core Technologies
The Implementing Cisco Collaboration Core Technologies (CLCOR) v1.0 course helps you prepare for the Cisco® CCNP® Collaboration and CCIE® Collaboration certifications, and advanced-level roles focused on ...