Internetworking and Configuration of Routers
This course is suitable for those who want to become administrators of Cisco routers. Participants will acquire theoretical knowledge necessary to perform the most common tasks required to manage Cisco routers.
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...
Internetworking Basics
This is a theoretical course aimed to demonstrate basic principles and technologies of data networks. A graduate gets a general overview of internetworking and OSI model and learns basics of the TCP/IP suite of ...
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...
Introducing Cisco Prime Infrastructure 2.0
This course provide information about Cisco product for monitoring and network management - Cisco Prime Infrastructure. It is the first course which familiarized students with the basic work with this software.
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
Configuration of Cisco Prime Infrastructure 3.x
This course provide information about new Cisco product for monitoring and network management - Cisco Prime Infrastructure. It is the advanced course about the basic work with this software.
BGP MPLS-based Ethernet VPNs (E-VPN)
The course is intended for technicians familiar with MPLS technology and MPLS VPN, who need to expand their knowledge. The course introduces the advanced capabilities of Ethernet VPN (EVPN) over MPLS, their ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...