Vendor Cancel filter
Advanced Negotiation Training
You'll participate in 4 advanced negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll boost your skill to think about negotiation strategically.
Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
Certified Information Systems Security Professional
If you are working or involve in cyber-security or information governance, now it is time to take your experience to the next level. This course is ideal for individuals with security responsibilities, for example: ...
Current ICT trends served in the two-day training session that focuses on the market as a whole, and no technology is preferred. The training introduces to attendees the past and nowadays fast development of the ICT ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Configuring BIG-IP AFM: Advanced Firewall Manager
This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP® Advanced Firewall Manager system. Students are introduced to the AFM user ...
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Configuring BIG-IP on Viprion
This course provides network professionals with a functional understanding of the BIG-IP VIPRION chassis platform. This course includes an overview of chassis platforms, hardware options, Clustered Multi-Processing ...
EC-Council Certified Security Analyst
The original EC-Council Certified Security Analyst training is an advanced security training suitable for all CEH attendants. Students will learn how to efectively analyze all aspect of IT security in order to ...
Configuring BIG-IP DNS
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
Linux Virtualization with KVM
By the end of this course, Learners will understand how the Linux Kernel, QEMU, libvirt and other related open source components can be assembled to create a virtual IT infrastructure, develop practical deployment ...
Neutron The OpenStack Networking Service
At the end of the course, Learners should be able to: Understand the OpenStack networking components and how they work together Understand the architecture of an OpenStack based network Troubleshoot an OpenStack ...