MITRE ATT&CK Practical
This one-day course covers practical use cases for development of cyber security capabilities in modern organizations with the help of MITRE ATT&CK framework. Trainees will learn to use MITRE ATT&CK in threat ...
SAN Basics
DC-S1 is a theoretical course aimed to demonstrate basic principles and technologies of storage area networks. A graduate gets a general overview of Fibre Channel technology, including terminology, design, way of ...
Advanced SAN Configuration and FCoE
Participants will learn how to use and configure several more advanced Fibre Channel technology and Cisco MDS/Nexus switches features, e.g. Inter-VSAN routing, Enhanced Zoning, etc.
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
Introduction to Server Virtualization
Server virtualization is a key component in modern Data Centers, however, it is also a powerful IT tool for a simple and fast-provisioned environment for testing and deploying a variety of applications.
Cisco ACI - Troubleshooting and Operations
Cisco Application Policy Infrastructure Controller (APIC) provides its administrators wide monitoring, management and troubleshooting tools for ACI. Goal of this training is to familiarize participants with all of ...
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
ACI Programmability
The course will introduce participants to various options and tools for development of their own applications used to automate configuration and monitoring of ACI architecture. Participants will gain practical ...
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
AI Robotics, Drone - UAV / UAS Practical Skills Building
Principals of UAVs and the Ground Control Station (UAS) Flight Safety and Check Regional Laws Flight Planning Software and Digital Data Storage USB Programmers / UART / JTAG System Hardware Architecture Software ...