Advanced MPLS
The course is designed for technical specialist with practical experience with MPLS technology and applications of MPLS VPNs, who need to expand his knowledge. The course is focused to advanced L3 MPLS VPN ...
Internetworking and Configuration of Routers
This course is suitable for those who want to become administrators of Cisco routers. Participants will acquire theoretical knowledge necessary to perform the most common tasks required to manage Cisco routers.
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
Practical Introduction to Cloud Environments
" Explain basic cloud environment principles with compare traditional IT " Public cloud vendors overview " Hybrid cloud solutions as a new way " Service models " Basic architecting ...
QoS implementation and configuration Catalyst 9000
Make participants familiar with QoS implementation and configuration on the new Cisco enterprise switching family, Catalyst 9000. The course includes several labs, allowing participants deeper insight into relatively ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
FirePOWER Services
The goal of the course is to learn key functionalities of Cisco FirePOWER Services. The curriculum provides the configuration and troubleshooting guidelines for implementation on ASA module.
L1 (Foundation) TOGAF 9.2
The course is focused on detail explanation of TOGAF – the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Troubleshooting BIG-IP LTM
This course will provide system and network specialists with knowledge and hands-on experience with the methodology and tools for solving problems associated with BIG-IP LTM system configuration and administration.
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.