NSX: Install,Configure, Manage [V4.0]
This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment. This course covers key features and functionality offered in the NSX 4.
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Internetworking Basics
This is a theoretical course aimed to demonstrate basic principles and technologies of data networks. A graduate gets a general overview of internetworking and OSI model and learns basics of the TCP/IP suite of ...
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
vSphere: Operate, Scale and Secure [V8]
This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the ...
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Panorama: Managing Firewalls at Scale (EDU-220)
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.