Technology Cancel filter
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security test Detect most common web application vulnerabilities Perform social engineering penetration test Analyze e-mail headers Analyze ...
Current ICT trends served in the two-day training session that focuses on the market as a whole, and no technology is preferred. The training introduces to attendees the past and nowadays fast development of the ICT ...
Advanced Negotiation Training
You'll participate in 4 advanced negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll boost your skill to think about negotiation strategically.
Implementing and Oper. Enterprise Network Core Technologies
The goal of this course is to develop the core networking skills needed to configure, operate, troubleshoot and manage Enterprise wired and wireless networks. It also requires you to understand and implement ...
Implementing Cisco SD-WAN Solutions (ENSDWI)
The Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0 course gives you training about how to design, deploy, configure, and manage your Cisco ® Software-Defined WAN (SD-WAN) solution in a large-scale live network, ...
Open Agile Architecture
Open Agile Architecture (O-AA) is a brand new standard published by The Open Group in the second half of 2020. It contains a lot of useful techniques for agile and digital transformation of the architecture of the ...
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Identify the need for security in software development projects Eliminate vulnerabilities in software Implement basic security mechanisms to protect users and data Use multiple testing methodologies to find and ...
Implementing Cisco Enterprise Advanced Routing and Services
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network.
Security monitoring and incident response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
L1 (Foundation) for ArchiMate 3.1
The course guides you through the ArchiMate modeling language – standard for Enterprise architecture – explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
Enterprise architecture (EA) is a necessity for enterprises of almost all sizes. They are using it for efficient management of the whole enterprise and its assets. It can help you to be prepared for future changes, ...
L1 (Foundation) TOGAF 9.2
The course is focused on detail explanation of TOGAF – the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...