Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
Cisco Cloud Managed Networking using Cisco Meraki
The goal of this course is to provide the students with overall information about the Cisco Meraki technology and products. During the three days of this training, students will become familiar with the Cisco Meraki ...
Introduction to Server Virtualization
Server virtualization is a key component in modern Data Centers, however, it is also a powerful IT tool for a simple and fast-provisioned environment for testing and deploying a variety of applications.
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
AI Robotics, Drone - UAV / UAS Practical Skills Building
Principals of UAVs and the Ground Control Station (UAS) Flight Safety and Check Regional Laws Flight Planning Software and Digital Data Storage USB Programmers / UART / JTAG System Hardware Architecture Software ...
SAN Basics
DC-S1 is a theoretical course aimed to demonstrate basic principles and technologies of storage area networks. A graduate gets a general overview of Fibre Channel technology, including terminology, design, way of ...
Advanced SAN Configuration and FCoE
Participants will learn how to use and configure several more advanced Fibre Channel technology and Cisco MDS/Nexus switches features, e.g. Inter-VSAN routing, Enhanced Zoning, etc.