Firewall: Configuration and Management (EDU-210)
Goals The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo ...
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
Microsoft Security, Compliance, and Identity Fundamentals
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Implementing and Operating Cisco Security Core Technologies
Implementing Cisco Application Centric Infrastructure
Microsoft Identity and Access Administrator
In this Microsoft Certified: Identity and Access Administrator Associate course, you’ll learn to design, implement and operate your business' identity and access management system by using Azure AD.
Implementing and Operating Cisco DC Core Technologies
TRN_SESA
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort email security appliances to successfully manage and troubleshoot email traffic entering and leaving the enterprise ...
Developing Solutions using IoT and Edge Platforms
After taking this course, you should be able to: Explain the fundamentals of Cisco IoT and list common devices involved List the common protocols, standards, and data flows of IoT Explain the Cisco IoT, common needs, ...
Implementing Secure Solutions with Virtual Private Networks
In this training, participants will learn how to secure data that goes through a network infrastructure by implementing a VPN solution built on Cisco products. Participants will gain experience in configuring ...