CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Understanding Cisco WirelessFoundations
This course will help you: Learn the skills, technologies, and best practices needed to manage a Cisco WLAN network Understand and implement a Cisco wireless network architecture Design and implement WLAN maintenance ...
MS Azure alapismeretek gyakorlati felhős scenariókkal
Ez a kurzus azon mérnökök számára készült, akik rendelkeznek on-premise infrastruktúrában szerzett tervezési és üzemeltetési tapasztalatokkal és szeretnék megismerni a Microsoft felhőtechnológiája által kínált ...
Microsoft Azure Fundamentals
This two-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support. Note: This course provides an Azure pass ...
Wireless hálózatok alapjai
Az alapvető vezeték nélküli technológiák és elvek ismertetése. Cisco vezeték nélküli termékek konfigurálása alapszinten..
Cisco Cloud Managed Networking using Cisco Meraki
The goal of this course is to provide the students with overall information about the Cisco Meraki technology and products. During the two days of this training, students will become familiar with the Cisco Meraki ...
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Certified Information Systems Security Professional
If you are working or involve in cyber-security or information governance, now it is time to take your experience to the next level. This course is ideal for individuals with security responsibilities, for example: ...
Cyber Attack and Defense in Practice
Course is taught using the Alef Cyber Security Polygon - virtual environment containing a set of small corporate networks, simulating the infrastructure, systems and employees of real organizations.
Security monitoring and incident response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Microsoft 365 Fundamentals
Differentiate between the various cloud service models. Identify the key differences between Microsoft 365 and Office 365. Plan for migration to Microsoft 365 services. Identify key differences between Microsoft ...