Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Technology Cancel filter
Location
Language
Difficulty
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
Cisco ACI & Kubernetes Networking
The major trend in a datacenter networking is currently centrally managed network, fulfilling all the requirements of modern applications - from a huge data throughput, simple scalability, enhanced security for any ...
Nexus 7000 - Hardware and Basic Cofiguration
This course is designed for technical professionals who are responsible for basic installations, configurations, and operation of Cisco Nexus 7000 in Data Center environment. Upon completion of this course, you ...
Nexus 7000 Advanced Configuration
This course is for technical professionals who need to know how to design, configure advanced features of Cisco Nexus 7000 in data center environment. The course is primary focused on advanced features such as OTV, ...
Basics of Data ONTAP C-Mode Administration
Goal of this course is to teach basic administration of clustered Data ONTAP, using lectures and hands-on exercises. Students will configure and manage a Data ONTAP cluster so after course they will be able manage ...
VMware vSphere: Install, Configure, Manage [V7]
Describe the software-defined data center Deploy an ESXi host and create virtual machines Describe vCenter Server architecture Deploy a vCenter Server instance or VMware vCenter Server™ Appliance™ Use vCenter ...
Nexus Programmability
To introduce participants to various options and tools for development of own applications used to automate configuration and monitoring on a Nexus(NX-OS) platform. Participants will gain practical experience with ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
VMware Horizon Mirage: Install, Configure, Manage
Install and configure Horizon Mirage components. Demonstrate how to navigate and use Horizon Mirage Management Console. Identify the process for deploying Horizon Mirage to endpoints.
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Data Protection
Data Protection is a course that provides a basic overview of the data protection techniques and procedures stored and maintained by organization. The course ranges from threat identification through the technologies ...
VMware Horizon 8: Infrastructure Administration
This two-day, hands-on course gives you the skills to install and configure a virtual desktop infrastructure platform. This course builds your skills in installing and configuring VMware Horizon® through a ...
VMware Horizon 8: Skills for Virtual Desktop Management
Implementing & Troubleshooting ACI Security
The Cisco ACI platform itself can provide many features related to (micro)segmentation, network traffic filtering, or simply incorporate specialized security devices into the path between internal and external endpoints.