Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Advanced VPN for Cisco Routers
S4 is a four-day instructor-led course focused on VPN configuration of Cisco technologies. The curriculum covers detailed explanation of IPsec and IKEv2 protocol. The course also introduces the concept of IPsec VPN ...
Internetworking Basics
This is a theoretical course aimed to demonstrate basic principles and technologies of data networks. A graduate gets a general overview of internetworking and OSI model and learns basics of the TCP/IP suite of ...
Introducing Flowmon Technology
This course provide information about Flowmon technology for monitoring the performance and security of your network. It is the first course which familiarized students with the basic work with this software.
Wi-Fi attacks and penetration testing
This course is introduction to Wi-Fi security testing and is meant for engineers that requires theoretical and practical knowledge to conduct security assessment on corporate and other Wi-Fi networks.
Nexus 9300/9500 - NXOS mode
This instructor-led training is designed for technical professionals who have responsibilities installing, configuring, and operating Nexus 9500/9300 and Nexus 2000 in data center environment.
OSPF Configuration and Design
The students will learn how to design, implement and operate an OSPF network. The training covers topics how to configure basic and advanced features of the OSPF protocol on Cisco routers.
Cisco IOS IP Service Level Agreement (IP SLA)
This course give you not only great knowledge of basic IP SLA operations, but everything what you will need to correct configure and deploy of any IP SLA operation like multiple operations scheduling, proactive ...
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
CoPP (Control Plane Policing)
To familiarize participants with the principles and possibilities of Control Plane Policing and how to secure Cisco IOS/IOS XE/IOS XR platforms through the CoPP feature. Participants receive information regarding the ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Key Account Negotiator
You‘ll be able to identify the strategy and behavioral patterns of your counterpart which will allow you to prepare a winning strategy. In two days you‘ll learn to exert pressure on your counterpart, to make demands ...
Advanced administration of CUCM and signaling protocols
By completion of this course participant will understand the internal processes of voice gateway, will be able to analyze calls passing through the voice gateway, which is necessary to implement, operate and possibly ...