Sortiraj po
Filter
Online / Onsite
Guaranteed term
Vendor Otkaži filter
Tehnologija Otkaži filter
Lokacija
Jezik
Implementing and Configuring the Cisco Identity Serv. Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
CompTIA Security+
Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI .
L1 (Foundation) + L2 (Practitioner) TOGAF® 10
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments. Analyze the cybersecurity threat landscape. Analyze reconnaissance threats to ...
Configuring BIG-IP Access Policy Manager
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.
IPv6 Fundamentals, Design and Deployment
IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 is an instructor-led course that is presented by Cisco Learning Partners to end-user customers. This five-day course provides network engineers and technicians ...
Implementing Cisco QoS
The 5-day Implementing Cisco Quality of Service (QOS) v2.3 course provides students with in-depth knowledge of IP QoS requirements, conceptual models using Differentiated Services (DiffServ), Integrated Services ...
ArchiMate
Explanation of ArchiMate standard in detail Prepare students for the certification exam .
Securing Email with Cisco Email Security Appliance
The Securing Email with Cisco Email Security Appliance (SESA) v3.0 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business ...
Agile Business Analysis
After completion of the course, students will be able to: Review techniques to perform the agile requirements management process, applying fundamental agile principles. Identify important competencies of a business ...