Rendezés
Filter
Online / Onsite Szűrés törlése
Garantált idő
Gyártó Szűrés törlése
Technológia Szűrés törlése
Helyszín
Nyelv
Fokozat
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Wireless hálózatok alapjai
Az alapvető vezeték nélküli technológiák és elvek ismertetése. Cisco vezeték nélküli termékek konfigurálása alapszinten..
Cisco Cloud Managed Networking using Cisco Meraki
The goal of this course is to provide the students with overall information about the Cisco Meraki technology and products. During the two days of this training, students will become familiar with the Cisco Meraki ...
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Cyber Attack and Defense in Practice
Course is taught using the Alef Cyber Security Polygon - virtual environment containing a set of small corporate networks, simulating the infrastructure, systems and employees of real organizations.
Security monitoring and incident response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
VMware vSphere: What's New [V8]
In this 2-day course, you will explore the new features and enhancements in VMware vCenter® 8.0, VMware ESXi™ 8.0, and VMware vSphere® 8.0. Through use-case scenarios, demonstrations, labs, and simulations, you ...
CompTIACybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...