Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Advanced VPN for Cisco Routers
S4 is a four-day instructor-led course focused on VPN configuration of Cisco technologies. The curriculum covers detailed explanation of IPsec and IKEv2 protocol. The course also introduces the concept of IPsec VPN ...
Configuration of Switches
The course is designed for participants who need to acquire basic theoretical and practical (configuration) knowledge of Cisco switches used in Ethernet LAN networks. After completing, the participant will be ...
Implementing and troubleshooting networks
The course is designed for candidates who need to have theoretical and practical (configuration) knowledge for implementing and troubleshooting networks using time (frequency) synchronization.
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Advanced MPLS
The course is designed for technical specialist with practical experience with MPLS technology and applications of MPLS VPNs, who need to expand his knowledge. The course is focused to advanced L3 MPLS VPN ...
Open Agile Architecture
Open Agile Architecture (O-AA) is a brand new standard published by The Open Group in the second half of 2020. It contains a lot of useful techniques for agile and digital transformation of the architecture of the ...
SD-WAN
The target of this course is, to introduce the student into SD-WAN world, explain to him the importance of each SD-WAN component and their logical and functional correlation. The initial service deployment is also ...
FirePOWER Services
The goal of the course is to learn key functionalities of Cisco FirePOWER Services. The curriculum provides the configuration and troubleshooting guidelines for implementation on ASA module.
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Basic VXLAN EVPN in NX-OS mode
Have you ever wondered how to build modern Data Center? VXLAN EVPN is one of most frequently used methods worldwide. As a technology based on standards is compatible between all Nexus devices supporting VXLAN and ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...