Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
SIP deep dive
In today's Unified Communications networks, SIP protocol is used whether for communication between endpoints, but also between different server systems. In this course, the participants will 'dive' into theoretical ...
FirePOWER Services
The goal of the course is to learn key functionalities of Cisco FirePOWER Services. The curriculum provides the configuration and troubleshooting guidelines for implementation on ASA module.
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Configuring VoIP on Cisco Products
This 4-day seminar contains theoretical as well as practical sections, that will present to the participants how analog voice networks, VoIP networks and Video communication do function.
VMware vSphere: Install, Configure, Manage [V8]
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to ...
ASA Firewall
This is a basic Cisco ASA firewall configuration course. This five-day course will prepare network security engineers for the basic skills and knowledge needed to configure Cisco ASA firewalls.
AI Robotics, Drone - UAV / UAS Practical Skills Building
Principals of UAVs and the Ground Control Station (UAS) Flight Safety and Check Regional Laws Flight Planning Software and Digital Data Storage USB Programmers / UART / JTAG System Hardware Architecture Software ...
Advanced administration of CUCM and signaling protocols
By completion of this course participant will understand the internal processes of voice gateway, will be able to analyze calls passing through the voice gateway, which is necessary to implement, operate and possibly ...
Advanced VPN for Cisco Routers
S4 is a four-day instructor-led course focused on VPN configuration of Cisco technologies. The curriculum covers detailed explanation of IPsec and IKEv2 protocol. The course also introduces the concept of IPsec VPN ...
Purple Teaming and practical threat emulation
This one-day course covers basics of threat emulation and cooperative security testing - or "purple teaming" - in modern organizations. It teaches trainees about methodologies relevant for threat emulation ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .