Sortiraj po
Filter
Online / Onsite Otkaži filter
Guaranteed term
Tehnologija Otkaži filter
Lokacija
Jezik
Configuring BIG-IP Access Policy Manager
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.
QoS Implementation on Cisco Devices
To identify, describe, and correctly implement the appropriate QoS mechanisms required to create an effective administrative policy providing QoS..
Data Networks Security
The course is best suited for network administrators and network security engineers. The participants wil learn the basic principles of network security and its implementation of Cisco routers.
ASA Firewall
Network security overview focusing on the installation, configuration and maintenance of the Cisco ASA Firewall..
Advanced VPN for Cisco Routers
Course S4 is a three-days instructor-led course primarily aimed for engineers responsible for VPN configuration on Cisco routers. Course is covering IPSec VPN technology needed for secure data transfer.
Securing Email with Cisco Email Security Appliance
The Securing Email with Cisco Email Security Appliance (SESA) v3.0 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business ...
Implementing and Configuring the Cisco Identity Serv. Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
Enhanced administration ofCUCM and signaling protocols
Basic Implementation of Cisco Unified Collaboration
Advance Configuration of Cisco Unified Collaboration
Implementation of videoconfererencing solutions in CiscoUC
Teorija Informacione Bezbednosti (Information Sec. Theory)
Trening je namenjen polaznicima koji žele da se upoznaju sa načinima, tehnikama i alatima za izvođenje napada, samim napadima i pretnjama po IT infrastrukturu i operativno poslovanje, te tehnikama i načinima odbrane ...