Sortiraj po
Filter
Online / Onsite Otkaži filter
Guaranteed term
Vendor Otkaži filter
Tehnologija Otkaži filter
Lokacija
Jezik
VMware vSphere: Install, Configure, Manage [V8]
Implementing and Configuring the Cisco Identity Serv. Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
CompTIA Security+
Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI .
Panorama: Managing Firewalls at Scale (EDU-220)
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
Firewall: Troubleshooting (EDU-330)
The Palo Alto Networks Firewall 10.0: Troubleshooting course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven ...
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments. Analyze the cybersecurity threat landscape. Analyze reconnaissance threats to ...
Configuring BIG-IP Access Policy Manager
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.
Securing Email with Cisco Email Security Appliance
The Securing Email with Cisco Email Security Appliance (SESA) v3.0 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business ...
Agile Business Analysis
After completion of the course, students will be able to: Review techniques to perform the agile requirements management process, applying fundamental agile principles. Identify important competencies of a business ...
Agile Project Management
After completion of the course, students will be able to: Learn how agile project management techniques can help to ensure project success Learn when agile is a good fit and when it is still appropriate to use a ...