Sort by
Filter
Online / Onsite
Guaranteed term
Vendor Cancel filter
Location
Difficulty Cancel filter
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Splunk Administration
The training aims to give participants the knowledge needed to understand, manage, configure, design, and troubleshoot Splunk deployment. This course is focused on architecture, license management, configuration, and ...
Architecting on AWS
In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly ...
Configuring BIG-IP DNS
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
Splunk Data Onboarding
The content of this course is an extended explanation of data processing with Splunk technology. Participants will be introduced to the data onboarding process, with hands-on practical examples, and gain the ...
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
Security Engineering on AWS
In this course, you will learn how to: Assimilate and leverage the AWS shared security responsibility model Architect and build AWS application infrastructures that are protected against the most common security ...
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Automating BIG-IP with AS3
This training starts with reviews of the Linux command line and application creation on BIG-IP and continues with the introduction of Automation and DevOps terminology and concepts.
Automating BIG-IP with Ansible
This course introduces network administrators, operators, and DevOps engineers to the foundational and F5-specific technologies required to automate BIG-IP. Participants will gain exposure to multiple technologies ...
Developing on AWS
This course teaches experienced developers how to programmatically interact with AWS services to build web solutions. It guides you through a high-level architectural discussion on resource selection and dives deep ...