Sort by
Filter
Online / Onsite
Guaranteed term
Technology Cancel filter
Location Cancel filter
Difficulty
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
Practical Introduction to Cloud Environments
" Explain basic cloud environment principles with compare traditional IT " Public cloud vendors overview " Hybrid cloud solutions as a new way " Service models " Basic architecting ...
Cisco ACI - Troubleshooting and Operations
Cisco Application Policy Infrastructure Controller (APIC) provides its administrators wide monitoring, management and troubleshooting tools for ACI. Goal of this training is to familiarize participants with all of ...
Architecting on AWS
In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly ...
Wi-Fi attacks and penetration testing
This course is introduction to Wi-Fi security testing and is meant for engineers that requires theoretical and practical knowledge to conduct security assessment on corporate and other Wi-Fi networks.
Configuring BIG-IP DNS
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
Nexus Programmability
To introduce participants to various options and tools for development of own applications used to automate configuration and monitoring on a Nexus(NX-OS) platform. Participants will gain practical experience with ...
Malware analysis
The course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code, discovery of its main functionalities and implementation of relevant defensive ...
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Introduction to Server Virtualization
Server virtualization is a key component in modern Data Centers, however, it is also a powerful IT tool for a simple and fast-provisioned environment for testing and deploying a variety of applications.
Implementing Cisco Application Centric Infrastructure
In this training, participants will learn how to deploy and manage the Cisco Nexus 9000 series switches in Cisco ACI (Application Centric Infrastructure) mode. The course gives you the knowledge and skills to ...
Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
Implement. and Operat. Cisco Service Prov. Net. Core Techn.
The course provides network engineers with the knowledge and skills needed to configure, verify, troubleshoot, and optimize, Service Provider IP network infrastructures. This course is intended to be a deep dive into ...