Sort by
Filter
Online / Onsite
Guaranteed term
Vendor
Technology Cancel filter
Location Cancel filter
Difficulty Cancel filter
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Configuring VoIP on Cisco Products
This 4-day seminar contains theoretical as well as practical sections, that will present to the participants how analog voice networks, VoIP networks and Video communication do function.
MITRE ATT&CK Practical
This one-day course covers practical use cases for development of cyber security capabilities in modern organizations with the help of MITRE ATT&CK framework. Trainees will learn to use MITRE ATT&CK in threat ...
Internetworking and Configuration of Routers
This course is suitable for those who want to become administrators of Cisco routers. Participants will acquire theoretical knowledge necessary to perform the most common tasks required to manage Cisco routers.
Configuration of Switches
The course is designed for participants who need to acquire basic theoretical and practical (configuration) knowledge of Cisco switches used in Ethernet LAN networks. After completing, the participant will be ...
Advanced Configuration of Cisco Switches
The course is designed for network administrators of larger enterprise networks and service providers (Internet, data transport), who require more detailed theoretical information and practical experience regarding ...
IPv6 Basics
The course is a part of the follow-up trainings on IPv6, its aim is to familiarize participants with the principles of the upcoming communication standard mainly from the theoretical point of view.
Internetworking Basics
This is a theoretical course aimed to demonstrate basic principles and technologies of data networks. A graduate gets a general overview of internetworking and OSI model and learns basics of the TCP/IP suite of ...
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
AI Robotics, Drone - UAV / UAS Practical Skills Building
Principals of UAVs and the Ground Control Station (UAS) Flight Safety and Check Regional Laws Flight Planning Software and Digital Data Storage USB Programmers / UART / JTAG System Hardware Architecture Software ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Wi-Fi attacks and penetration testing
This course is introduction to Wi-Fi security testing and is meant for engineers that requires theoretical and practical knowledge to conduct security assessment on corporate and other Wi-Fi networks.
Implementing Cisco Collaboration Applications
The Implementing Cisco Collaboration Applications (CLICA) v1.0 course shows you how to implement Single Sign-On (SSO), Cisco Unified IM and Presence, Cisco Unity Connection, and Cisco Unity Express.