Basics of Data ONTAP C-Mode Administration
Goal of this course is to teach basic administration of clustered Data ONTAP, using lectures and hands-on exercises. Students will configure and manage a Data ONTAP cluster so after course they will be able manage ...
VMware vSphere: Install, Configure, Manage 8
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi™ 8 and VMware vCenter® 8.
Securing Email with Cisco Email Security Appliance
The Securing Email with Cisco Email Security Appliance (SESA) v3.0 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business ...
VMware vRealize Operations: Install, Configure, Manage V8.6
This five-day, hands-on training course provides you with the knowledge and skills to deploy a VMware vRealize® Operations™ cluster that meets the monitoring requirements of your environment.
Agile Business Analysis
After completion of the course, students will be able to: Review techniques to perform the agile requirements management process, applying fundamental agile principles. Identify important competencies of a business ...
Agile Project Management
After completion of the course, students will be able to: Learn how agile project management techniques can help to ensure project success Learn when agile is a good fit and when it is still appropriate to use a ...
Business Analysis forOrganizations
After completion of the course, students will be able to: Analyze the strategic, tactical and operational business needs of companies and organization in combination with effective and efficient requirements ...
Business Analysis for Projects
After completion of the course, students will be able to: Understand the principles, tools and techniques and the processes to conduct business analysis in support of projects. Explain the importance of business ...
Business Process Management
After completion of the course, students will be able to: Understand the basic principles of business process management Become familiar with the key terms and concepts in BPM Learn the major approaches and ...
BPMN 2.0
After completion of the course, students will be able to: Understand the value that BPMN brings to process modeling Understand the opportunities and challenges of adopting BPMN Learn the semantics of the BPMN shapes ...
Teorija Informacione Bezbednosti (Information Sec. Theory)
Trening je namenjen polaznicima koji žele da se upoznaju sa načinima, tehnikama i alatima za izvođenje napada, samim napadima i pretnjama po IT infrastrukturu i operativno poslovanje, te tehnikama i načinima odbrane ...
Certified Information SystemsSecurity Professional
This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and ...