Online / Onsite
Online / Onsite
Vendor Cancel filter
Don‘t trade, negotiate! After a day of intensive training, you‘ll be able to control the emotions of your business counterpart and the entire negotiation. You‘ll learn to identify the exact moment when your business ...
This is a theoretical course aimed to demonstrate basic principles and technologies of data networks. A graduate gets a general overview of internetworking and OSI model and learns basics of the TCP/IP suite of ...
Configuring BIG-IP DNS
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Configuring BIG-IP Access Policy Manager
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.
CoPP (Control Plane Policing)
To familiarize participants with the principles and possibilities of Control Plane Policing and how to secure Cisco IOS/IOS XE/IOS XR platforms through the CoPP feature. Participants receive information regarding the ...
Key Account Negotiator
You‘ll be able to identify the strategy and behavioral patterns of your counterpart which will allow you to prepare a winning strategy. In two days you‘ll learn to exert pressure on your counterpart, to make demands ...
Practical Introduction to Cloud Environments
" Explain basic cloud environment principles with compare traditional IT " Public cloud vendors overview " Hybrid cloud solutions as a new way " Service models " Basic architecting ...
Cisco IOS IP Service Level Agreement (IP SLA)
This course give you not only great knowledge of basic IP SLA operations, but everything what you will need to correct configure and deploy of any IP SLA operation like multiple operations scheduling, proactive ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
BGP Configuration and Design
Introduction and processing in the BGP routing protocol and its components. Design and implementation of BGP routing, filtering and path selection optimization on Cisco IOS routers.
Data Networks Security
The course is best suited for network administrators and network security engineers. The participants wil learn the basic principles of network security and its implementation of Cisco routers.
Cisco ACI - Troubleshooting and Operations
Cisco Application Policy Infrastructure Controller (APIC) provides its administrators wide monitoring, management and troubleshooting tools for ACI. Goal of this training is to familiarize participants with all of ...
DC-S1 is a theoretical course aimed to demonstrate basic principles and technologies of storage area networks. A graduate gets a general overview of Fibre Channel technology, including terminology, design, way of ...
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...