Vendor Cancel filter
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...
Architecting on AWS
In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly ...
Key Account Negotiator
You‘ll be able to identify the strategy and behavioral patterns of your counterpart which will allow you to prepare a winning strategy. In two days you‘ll learn to exert pressure on your counterpart, to make demands ...
Configuring BIG-IP DNS
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
Don‘t trade, negotiate! After a day of intensive training, you‘ll be able to control the emotions of your business counterpart and the entire negotiation. You‘ll learn to identify the exact moment when your business ...
Sales Negotiator Officer negotiation training with A. Dolejs
Lead, trade, negotiate. You are the key to success, to the client and to money. You are under great pressure to deliver, not reaching an agreement is not an alternative, you can not afford to make mistakes at the ...
Prisma Access SASE Security: Design and Operation (EDU-318)
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and ...
AWS Technical Essentials
In this course, you will learn: Terminology and concepts related to the AWS platform How to navigate the AWS Management Console Key concepts of AWS security measures and AWS Identity and Access Management ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
The course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code, discovery of its main functionalities and implementation of relevant defensive ...
Automating BIG-IP with AS3
This training starts with reviews of the Linux command line and application creation on BIG-IP and continues with the introduction of Automation and DevOps terminology and concepts.
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.