Vendor Cancel filter
Current ICT trends served in the two-day training session that focuses on the market as a whole, and no technology is preferred. The training introduces to attendees the past and nowadays fast development of the ICT ...
EC-Council Certified Security Analyst
The original EC-Council Certified Security Analyst training is an advanced security training suitable for all CEH attendants. Students will learn how to efectively analyze all aspect of IT security in order to ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
VMware vSphere 5: Fast Track V7
Configure and manage ESXi networking and storage Create, configure, migrate, manage, and monitor virtual machines and virtual appliances Use VMware vCenter Converter™ Standalone Manage user access to the VMware ...
VMware vSphere: Install, Configure, Manage [V7]
Describe the software-defined data center Deploy an ESXi host and create virtual machines Describe vCenter Server architecture Deploy a vCenter Server instance or VMware vCenter Server™ Appliance™ Use vCenter ...
VMware vSphere: Optimize and Scale V7
Configure and manage ESXi networking and storage for a large and sophisticated enterprise. Manage changes to the vSphere environment. Optimize the performance of all vSphere components.
VMware vSphere 5: What´s New
This hands-on training course explores new features in VMware vCenter Server™ 5.0 and VMware ESXi™ 5.0. Topics include VMware vSphere® 5 installation and how to upgrade from vSphere 4.
An Introduction OpenStack
By the end of this course, learners will able to describe how to create and manage private and public clouds with OpenStack including Deployment, administration and use the core OpenStack services.
Linux Virtualization with KVM
By the end of this course, Learners will understand how the Linux Kernel, QEMU, libvirt and other related open source components can be assembled to create a virtual IT infrastructure, develop practical deployment ...
Neutron The OpenStack Networking Service
At the end of the course, Learners should be able to: Understand the OpenStack networking components and how they work together Understand the architecture of an OpenStack based network Troubleshoot an OpenStack ...
Application Portfolio Management (APM)
Management of the application portfolio may bring significant savings. We will explain how to manage your portfolio, what to look for and how to avoid failures..
Cryptosession: Introduction to cryptography
Introduce participants to the basics of cryptography Clarify relationships and principles for this important field Show limitations of individual mechanisms in terms of speed and architecture Alert on basic problems ...
You'll participate in 4 practical negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll see short films of negotiators and you'll learn from their ...