Vendor Cancel filter
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Key Account Negotiator
You‘ll be able to identify the strategy and behavioral patterns of your counterpart which will allow you to prepare a winning strategy. In two days you‘ll learn to exert pressure on your counterpart, to make demands ...
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
FBI negotiation for women
Negotiation is all about focusing on your objective, about opportunities, about internal struggle, about courage, and about the right mindset and strategy. About the used tactics, about emotions, and about you.
Configuring BIG-IP DNS
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
Troubleshooting BIG-IP LTM
This course will provide system and network specialists with knowledge and hands-on experience with the methodology and tools for solving problems associated with BIG-IP LTM system configuration and administration.
The course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code, discovery of its main functionalities and implementation of relevant defensive ...
Configuring BIG-IP AFM: Advanced Firewall Manager
This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP® Advanced Firewall Manager system. Students are introduced to the AFM user ...
FBI negotiator training with Radim Parik
Negotiate. There are some of the most difficult negotiations ahead of you. We will prepare you for them. During a 3-day intensive training course, we will form a negotiation team, and prepare your strategy and demands.
Don‘t trade, negotiate! After a day of intensive training, you‘ll be able to control the emotions of your business counterpart and the entire negotiation. You‘ll learn to identify the exact moment when your business ...
Sales Negotiator Officer negotiation training with A. Dolejs
Lead, trade, negotiate. You are the key to success, to the client and to money. You are under great pressure to deliver, not reaching an agreement is not an alternative, you can not afford to make mistakes at the ...
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...