Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor Cancel filter
Location
Difficulty Cancel filter
Configuring BIG-IP DNS
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
Advanced WLAN configuration on Catalyst 9800
Advanced configuration, monitoring, maintaining and troubleshooting on Cisco Wireless LAN solutions based on IOS-XE platform (Catalyst 9800 & 9100). Advanced features and architectures including wireless security.
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...
Basics of Cisco Unified Collaboration implementation
The seminar is designed for participants who want to familiarize deeper with the Collaboration technology, mainly focused on the basic principles of operation and implementation of voice and video calls.
Nexus 9300/9500 and Application Centric Infrastruct.
This instructor-led training is designed for technical professionals who have responsibilities installing, configuring, and operating Nexus 9500/9300 in ACI mode. Upon completion of this course, you should be ...
Nexus Programmability
To introduce participants to various options and tools for development of own applications used to automate configuration and monitoring on a Nexus(NX-OS) platform. Participants will gain practical experience with ...
Wireless transmission networks - from 0G to 5G
The aim of this course is to deepen the knowledge of graduates familiar with the functions of the 5G system. students will get acquainted with more detailed information about the construction of their own core, radio ...
Implementing & Troubleshooting ACI Security
The Cisco ACI platform itself can provide many features related to (micro)segmentation, network traffic filtering, or simply incorporate specialized security devices into the path between internal and external endpoints.