L1 (Foundation) for ArchiMate 3.1
The course guides you through the ArchiMate modeling language – standard for Enterprise architecture – explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
Azure Fundamentals
This one-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support..
Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
Azure Administrator Associate
This course teaches IT Professionals how to secure identities, manage their Azure subscriptions, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network ...
Wireless LAN fundamentals
Describe the fundamentals of wireless networks with focus on Cisco Unified Wireless Network. To learn how to install, configure, troubleshoot, monitor and maintain basic Cisco Wireless LAN solutions based on IOS-XE ...
MITRE ATT&CK Practical
This one-day course covers practical use cases for development of cyber security capabilities in modern organizations with the help of MITRE ATT&CK framework. Trainees will learn to use MITRE ATT&CK in threat ...
MS365-Overview of accounts and possibility of integration
Five days of instructor-led training preparing students for MS-100 certification exam. At course completion students will be able: Office 365 overview Moving your organization to Office 365 Configuring Office ...
Advanced WLAN configuration on Catalyst 9800
Advanced configuration, monitoring, maintaining and troubleshooting on Cisco Wireless LAN solutions based on IOS-XE platform (Catalyst 9800 & 9100). Advanced features and architectures including wireless security.
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
Cisco Cloud Managed Networking using Cisco Meraki
The goal of this course is to provide the students with overall information about the Cisco Meraki technology and products. During the three days of this training, students will become familiar with the Cisco Meraki ...
Practical Introduction to Cloud Environments
" Explain basic cloud environment principles with compare traditional IT " Public cloud vendors overview " Hybrid cloud solutions as a new way " Service models " Basic architecting ...
L1 (Foundation) TOGAF 9.2
The course is focused on detail explanation of TOGAF – the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...