Key Account Negotiator
You‘ll be able to identify the strategy and behavioral patterns of your counterpart which will allow you to prepare a winning strategy. In two days you‘ll learn to exert pressure on your counterpart, to make demands ...
Sales Negotiator
Don‘t trade, negotiate! After a day of intensive training, you‘ll be able to control the emotions of your business counterpart and the entire negotiation. You‘ll learn to identify the exact moment when your business ...
Sales Negotiator Officer negotiation training with A. Dolejs
Lead, trade, negotiate. You are the key to success, to the client and to money. You are under great pressure to deliver, not reaching an agreement is not an alternative, you can not afford to make mistakes at the ...
Prisma Access SASE Security: Design and Operation (EDU-318)
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and ...
Configuring BIG-IP DNS
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
Malware analysis
The course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code, discovery of its main functionalities and implementation of relevant defensive ...
Automating BIG-IP with AS3
This training starts with reviews of the Linux command line and application creation on BIG-IP and continues with the introduction of Automation and DevOps terminology and concepts.
Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Automating BIG-IP with Ansible
This course introduces network administrators, operators, and DevOps engineers to the foundational and F5-specific technologies required to automate BIG-IP. Participants will gain exposure to multiple technologies ...
Configuring BIG-IP Access Policy Manager
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.