Splunk Administration
The training aims to give participants the knowledge needed to understand, manage, configure, design, and troubleshoot Splunk deployment. This course is focused on architecture, license management, configuration, and ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Splunk Data Onboarding
The content of this course is an extended explanation of data processing with Splunk technology. Participants will be introduced to the data onboarding process, with hands-on practical examples, and gain the ...
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Azure Fundamentals
This one-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support..
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
Azure Network Engineer Associate
This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. This course covers the process of designing, implementing, and managing core Azure networking infrastructure, ...
L1 (Foundation) TOGAF 9.2
The course is focused on detail explanation of TOGAF – the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Troubleshooting BIG-IP LTM
This course will provide system and network specialists with knowledge and hands-on experience with the methodology and tools for solving problems associated with BIG-IP LTM system configuration and administration.
Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
L1 (Foundation) for ArchiMate 3.1
The course guides you through the ArchiMate modeling language – standard for Enterprise architecture – explaining usage of all elements, relationships and other concepts using real examples from multiple industries.