Technology Cancel filter
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Implementing and Operating Cisco Security Core Technologies
This is the main course, which is designed to prepare for CCNP Security certification, and the test from this course is also used to complete the CCIE Security lab. This five-day course will prepare network security ...
Securing Networks with Cisco Firepower Next Gen. Firewall
The goal of this course is to provide you with a solid foundation in Firepower Threat defense NGFW technology. You will gain the competency and skills required to implement and manage a Firepower system regardless ...
Implementing and Configuring the Cisco Identity Serv. Engine
Implementing Cisco Identity Service Engine Secure Solutions (ISE) is a course designed to provide students with hands-on lab configuration of the Cisco® Identity Services Engine running software version 2.
Current ICT trends served in the two-day training session that focuses on the market as a whole, and no technology is preferred. The training introduces to attendees the past and nowadays fast development of the ICT ...
Securing Email with Cisco Email Security Appliance
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort email security appliances to successfully manage and troubleshoot email traffic entering and leaving the enterprise ...
Securing the Web with Cisco Web Security Appliance
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort web security appliances to successfully manage and troubleshoot web traffic in the enterprise network.
Implementing Secure Solutions with Virtual Private Networks
In this training, participants will learn how to secure data that goes through a network infrastructure by implementing a VPN solution built on Cisco products. Participants will gain experience in configuring ...
EC-Council Certified Security Analyst
The original EC-Council Certified Security Analyst training is an advanced security training suitable for all CEH attendants. Students will learn how to efectively analyze all aspect of IT security in order to ...
Linux Virtualization with KVM
By the end of this course, Learners will understand how the Linux Kernel, QEMU, libvirt and other related open source components can be assembled to create a virtual IT infrastructure, develop practical deployment ...
Neutron The OpenStack Networking Service
At the end of the course, Learners should be able to: Understand the OpenStack networking components and how they work together Understand the architecture of an OpenStack based network Troubleshoot an OpenStack ...
Application Portfolio Management (APM)
Management of the application portfolio may bring significant savings. We will explain how to manage your portfolio, what to look for and how to avoid failures..
You'll participate in 4 practical negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll see short films of negotiators and you'll learn from their ...
Advanced Negotiation Training
You'll participate in 4 advanced negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll boost your skill to think about negotiation strategically.