Sort by
Filter
Online / Onsite
Guaranteed term
Vendor
Technology Cancel filter
Location Cancel filter
Difficulty
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Configuring VoIP on Cisco Products
This 4-day seminar contains theoretical as well as practical sections, that will present to the participants how analog voice networks, VoIP networks and Video communication do function.
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Understanding Cisco Collaboration Foundations
The Understanding Cisco Collaboration Foundations (CLFNDU) v1.1 course gives you the skills and knowledge needed to administer and support a simple, single-site Cisco® Unified Communications Manager (CM) solution ...
Implementing Cisco Collab. Cloud and Edge Solutions
The Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) v1.0 course provides you with knowledge about Cisco® Expressway Series solutions enabling business-to-business (B2B) calls, Cisco Mobile, remote ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Malware analysis
The course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code, discovery of its main functionalities and implementation of relevant defensive ...
Advanced administration of CUCM and signaling protocols
By completion of this course participant will understand the internal processes of voice gateway, will be able to analyze calls passing through the voice gateway, which is necessary to implement, operate and possibly ...
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
Configuring Cisco Unified Computing System
The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System (Cisco UCS) B-series blade servers, Cisco UCS C-Series, and S-Series ...
Implementing and Operating Cisco Collab. Core Technologies
The Implementing Cisco Collaboration Core Technologies (CLCOR) v1.0 course helps you prepare for the Cisco® CCNP® Collaboration and CCIE® Collaboration certifications, and advanced-level roles focused on ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...