Implementing and Configuring the Cisco Identity Serv. Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Configuring BGP on Cisco Routers
This course provides students with in-depth knowledge of BGP, the routing protocol that is one of the underlying foundations of the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS).
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
Securing Email with Cisco Email Security Appliance
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort email security appliances to successfully manage and troubleshoot email traffic entering and leaving the enterprise ...
Implementing Secure Solutions with Virtual Private Networks
In this training, participants will learn how to secure data that goes through a network infrastructure by implementing a VPN solution built on Cisco products. Participants will gain experience in configuring ...
Securing the Web with Cisco Web Security Appliance
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort web security appliances to successfully manage and troubleshoot web traffic in the enterprise network.
IPv6 Fundamentals, Design and Deployment
IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 is an instructor-led course that is presented by Cisco Learning Partners to end-user customers. This five-day course provides network engineers and technicians ...
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...