Sort by
Filter
Online / Onsite
Guaranteed term
Technology
Location Cancel filter
Difficulty Cancel filter
Configuration of Switches
The course is designed for participants who need to acquire basic theoretical and practical (configuration) knowledge of Cisco switches used in Ethernet LAN networks. After completing, the participant will be ...
Internetworking and Configuration of Routers
This course is suitable for those who want to become administrators of Cisco routers. Participants will acquire theoretical knowledge necessary to perform the most common tasks required to manage Cisco routers.
Azure Fundamentals
This one-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support..
Azure Administrator Associate
This course teaches IT Professionals how to secure identities, manage their Azure subscriptions, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network ...
Cisco Cloud Managed Networking using Cisco Meraki
The goal of this course is to provide the students with overall information about the Cisco Meraki technology and products. During the three days of this training, students will become familiar with the Cisco Meraki ...
Data Networks Security
The course is best suited for network administrators and network security engineers. The participants wil learn the basic principles of network security and its implementation of Cisco routers.
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Securing Email with Cisco Email Security Appliance
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort email security appliances to successfully manage and troubleshoot email traffic entering and leaving the enterprise ...
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Implementing Cisco Adv. Call Control and Mobility Services
The Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) v1.0 course covers advanced call control and mobility services. You will learn how to use Cisco® Unified Communications Manager features to ...