Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Location
Language
Difficulty
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...
Nexus 7000 - Hardware and Basic Cofiguration
This course is designed for technical professionals who are responsible for basic installations, configurations, and operation of Cisco Nexus 7000 in Data Center environment. Upon completion of this course, you ...
Nexus 7000 Advanced Configuration
This course is for technical professionals who need to know how to design, configure advanced features of Cisco Nexus 7000 in data center environment. The course is primary focused on advanced features such as OTV, ...
Nexus 9300/9500 - NXOS mode
This instructor-led training is designed for technical professionals who have responsibilities installing, configuring, and operating Nexus 9500/9300 and Nexus 2000 in data center environment.
Nexus 9300/9500 and Application Centric Infrastruct.
This instructor-led training is designed for technical professionals who have responsibilities installing, configuring, and operating Nexus 9500/9300 in ACI mode. Upon completion of this course, you should be ...
Basics of Data ONTAP C-Mode Administration
Goal of this course is to teach basic administration of clustered Data ONTAP, using lectures and hands-on exercises. Students will configure and manage a Data ONTAP cluster so after course they will be able manage ...
ICT trends
Current ICT trends served in the two-day training session that focuses on the market as a whole, and no technology is preferred. The training introduces to attendees the past and nowadays fast development of the ICT ...
Nexus Programmability
To introduce participants to various options and tools for development of own applications used to automate configuration and monitoring on a Nexus(NX-OS) platform. Participants will gain practical experience with ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Wireless transmission networks - from 0G to 5G
The aim of this course is to acquaint participants with the new generation of mobile 5G. Students will learn new features in the 5 G system such as a complete new radio part, new network core and new 5 G services.
Data Protection
Data Protection is a course that provides a basic overview of the data protection techniques and procedures stored and maintained by organization. The course ranges from threat identification through the technologies ...
Practical Introduction to EA and ITSM
Modern approaches to the strategic planning of organization ICT architecture and the ICT service operations served in the introductory course. We will introduce basic methodologies and frameworks for managing ICT ...
FBI negotiator training with Radim Parik
Negotiate. There are some of the most difficult negotiations ahead of you. We will prepare you for them. During a 3-day intensive training course, we will form a negotiation team, and prepare your strategy and demands.