Sort by
Filter
Online / Onsite Cancel filter
Vendor Cancel filter
Technology Cancel filter
Location
Difficulty
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Internetworking Basics
This is a theoretical course aimed to demonstrate basic principles and technologies of data networks. A graduate gets a general overview of internetworking and OSI model and learns basics of the TCP/IP suite of ...
Azure Fundamentals
This one-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support..
Troubleshooting BIG-IP LTM
This course will provide system and network specialists with knowledge and hands-on experience with the methodology and tools for solving problems associated with BIG-IP LTM system configuration and administration.
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
IT for non IT
Theoretical course focused on non-professional attendees. In a fun and understandable way, the training will introduce you briefly to today's IT trends, how the Internet works, how does the enterprise IT looks like ...
Introducing Cisco Prime Infrastructure 2.0
This course provide information about Cisco product for monitoring and network management - Cisco Prime Infrastructure. It is the first course which familiarized students with the basic work with this software.
QoS Implementation on Cisco Devices
To identify, describe, and correctly implement the appropriate QoS mechanisms required to create an effective administrative policy providing QoS..
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
Configuration of Cisco Prime Infrastructure 3.x
This course provide information about new Cisco product for monitoring and network management - Cisco Prime Infrastructure. It is the advanced course about the basic work with this software.
BGP MPLS-based Ethernet VPNs (E-VPN)
The course is intended for technicians familiar with MPLS technology and MPLS VPN, who need to expand their knowledge. The course introduces the advanced capabilities of Ethernet VPN (EVPN) over MPLS, their ...