Sortare dupa
Filter
Online / Onsite Anulează filtru
Termen garantat
Furnizor Anulează filtru
Tehnologie Anulează filtru
Localitate
Dificultate
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Configuring BIG-IP Local Traffic Manager
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Configuring Cisco Unified Computing System
Objectives After taking this course, you should be able to: Describe and implement SAN on Cisco UCS Describe Cisco UCS policies for service profiles Describe and implement Role-Based Access Control (RBAC) on Cisco ...
Understanding Cisco CybersecurOperations Fundamentals v1.0
After taking this course, you should be able to: Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
Troubleshooting BIG-IP LTM
This course will provide system and network specialists with knowledge and hands-on experience with the methodology and tools for solving problems associated with BIG-IP LTM system configuration and administration.
Implementing Cisco Collaboration Conferencing
After taking this course, you should be able to: Describe the Cisco conferencing architecture including cloud, hybrid, and on-premises conferencing Describe the physical deployment options and deployment models for ...
Protect Against Malware Treats with Cisco AMP for Endpoint
After taking this course, you should be able to: ? Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) ? Recognize the key features and concepts of the AMP for Endpoints product ? ...
Implm. Cisco NX-OS Switches and Fabrics in the Data Center
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.