Sort by
Filter
Online / Onsite Cancel filter
Vendor Cancel filter
Technology Cancel filter
Location
Difficulty
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
AWS Security Essentials
In this course, you will learn to: Identify security benefits and responsibilities when using the AWS Cloud Describe the access control and management features of AWS Understand the different data encryption methods ...
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Troubleshooting BIG-IP LTM
This course will provide system and network specialists with knowledge and hands-on experience with the methodology and tools for solving problems associated with BIG-IP LTM system configuration and administration.
AWS Technical Essentials
In this course, you will learn: Terminology and concepts related to the AWS platform How to navigate the AWS Management Console Key concepts of AWS security measures and AWS Identity and Access Management ...
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
Architecting on AWS
In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
Security Engineering on AWS
In this course, you will learn how to: Assimilate and leverage the AWS shared security responsibility model Architect and build AWS application infrastructures that are protected against the most common security ...
Advanced Architecting on AWS
In this course, you will learn how to: Apply the AWS Well-Architected Framework Manage multiple AWS accounts for your organization Connect an on-premises datacenter to the AWS Cloud Discuss billing implications of ...
Configuring BIG-IP AFM: Advanced Firewall Manager
This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP® Advanced Firewall Manager system. Students are introduced to the AFM user ...
Configuring BIG-IP Access Policy Manager
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.