Nexus Programmability
To introduce participants to various options and tools for development of own applications used to automate configuration and monitoring on a Nexus(NX-OS) platform. Participants will gain practical experience with ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
Configuration of Cisco Prime Infrastructure 3.x
This course provide information about new Cisco product for monitoring and network management - Cisco Prime Infrastructure. It is the advanced course about the basic work with this software.
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Introducing Flowmon Technology
This course provide information about Flowmon technology for monitoring the performance and security of your network. It is the first course which familiarized students with the basic work with this software.
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Splunk Administration
The training aims to give participants the knowledge needed to understand, manage, configure, design, and troubleshoot Splunk deployment. This course is focused on architecture, license management, configuration, and ...
Splunk Reporting
Reporting course is a continuation of the Basics course and is primarily intended for Splunk users and knowledge managers. It can be also appreciated by anyone interested in furthering their knowledge of the SPL ...
Splunk Data Onboarding
The content of this course is an extended explanation of data processing with Splunk technology. Participants will be introduced to the data onboarding process, with hands-on practical examples, and gain the ...
Wireless transmission networks - from 0G to 5G
The aim of this course is to deepen the knowledge of graduates familiar with the functions of the 5G system. students will get acquainted with more detailed information about the construction of their own core, radio ...
Wireless transmission networks - from 0G to 5G
The aim of this course is to acquaint participants with the new generation of mobile 5G. Students will learn new features in the 5 G system such as a complete new radio part, new network core and new 5 G services.
Data Protection
Data Protection is a course that provides a basic overview of the data protection techniques and procedures stored and maintained by organization. The course ranges from threat identification through the technologies ...