Sortiraj po
Filter
Online / Onsite
Vendor
Tehnologija
Lokacija
ArchiMate
Explanation of ArchiMate standard in detail Prepare students for the certification exam .
Implementing Secure Solutionswith Virtual Private Networks
In this training, participants will learn how to secure data that goes through a network infrastructure by implementing a VPN solution built on Cisco products. Participants will gain experience in configuring ...
Securing Email with Cisco Email Security Appliance
The Securing Email with Cisco Email Security Appliance (SESA) v3.0 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business ...
Cisco SD-WAN Operation and Deployment
Introducing Cisco SD-Access Introducing Cisco DNA Center Exploring Cisco SD-Access Solution Components Exploring Cisco SD-Access Wireless Architecture Automating Network Changes with Cisco DNA Center Deploying ...
Implementing and Operating Cisco Security Core Technologies
The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles.
Data Networks Security
The course is best suited for network administrators and network security engineers. The participants wil learn the basic principles of network security and its implementation of Cisco routers.
Introducing Cisco Prime Infrastructure
This course provide information about new Cisco product for monitoring and network management - Cisco Prime Infrastructure. It is the first course which familiarized students with the basic work with this software.
Advanced Configuration of Cisco Switches
The course is designed for network administrators of larger enterprise networks and service providers (Internet, data transport), who require more detailed theoretical information and practical experience regarding ...
Red Hat System Administration I
Red Hat System Administration I (RH124) equips you with Linux® administration "survival skills" by focusing on foundational Linux concepts and core tasks. You will learn how to apply command-line concepts ...
PRINCE2 - Projects in Controlled Environments Course
After completion of the course, students will be able to: Understand key concepts relating to projects and PRINCE2 Understand how the PRINCE2 principles underpin the PRINCE2 method Understand the PRINCE2 themes and ...
Project Portfolio Management
After completion of the course, students will be able to: Relate projects to an organization's strategic objectives Define what is involved in project prioritization in large, complex organizations Know how to ...
Advanced Project Management
Understand the Project Management knowledge areas and processes Understand the project parameters and the project life-cycle Develop a Work Breakdown Structure (WBS) and understand how it relates to project ...
IT for non IT
Teoretical training is focused on general public and in a very complex way provides information about current IT enviroment. You will see, which technologies are currently available, which of them are the most ...
Certified Information SystemsSecurity Professional
This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and ...