Sort by
Filter
Online / Onsite
Vendor
Technology Cancel filter
Location Cancel filter
Language Cancel filter
Difficulty Cancel filter
Implementing Cisco Enterprise Advanced Routing and Services
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network.
Implementing and Oper. Enterprise Network Core Technologies
The goal of this course is to develop the core networking skills needed to configure, operate, troubleshoot and manage Enterprise wired and wireless networks. It also requires you to understand and implement ...
Leveraging Cisco Intent-Based Networking DNA Assurance
The Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco Digital Network ...
Designing Cisco Enterprise Networks
The course provides CCNP-level network administrators with the knowledge and skills needed to design an enterprise network. This course is intended to be a deep dive into enterprise network design and an expansion ...
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...