Sortiraj po
Filter
Online / Onsite Otkaži filter
Guaranteed term
Vendor Otkaži filter
Tehnologija Otkaži filter
Lokacija
Jezik
Implementing and Configuring the Cisco Identity Serv. Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
Configuring Cisco MDS 9000 Series Switches
The Configuring Cisco MDS 9000 Series Switches (DCMDS) v3.1 course shows you how to implement, manage, and troubleshoot Cisco® MDS 9000 Series Switches, to build highly available, scalable storage networks.
Designing Cisco Data Center Infrastructure
The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco® data center solutions and technologies across network, compute, virtualization, ...
Troubleshooting Cisco Data Center Infrastructure
The Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 course shows you how to troubleshoot LAN, SAN, Cisco® Data Center Unified Fabric, Cisco Unified Computing System™ (Cisco UCS®), and Cisco ...
Securing Email with Cisco Email Security Appliance
The Securing Email with Cisco Email Security Appliance (SESA) v3.0 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business ...
Microsoft Cloud 365 Mobility and Security
This three-MOC packaged set aligned to Microsoft 365 Exam: Microsoft 365 Mobility and Security contains courseware that helps prepare students for Exams MS-101. Passing this exam is required to earn the Microsoft 365 ...
Microsoft 365 Security Administration
Microsoft 365 Certified: Security Administrator Associate Microsoft 365 Security Administrators proactively secure M365 enterprise and hybrid environments, implement and manage security and compliance solutions, ...
Agile Business Analysis
After completion of the course, students will be able to: Review techniques to perform the agile requirements management process, applying fundamental agile principles. Identify important competencies of a business ...
Agile Project Management
After completion of the course, students will be able to: Learn how agile project management techniques can help to ensure project success Learn when agile is a good fit and when it is still appropriate to use a ...
Business Analysis forOrganizations
After completion of the course, students will be able to: Analyze the strategic, tactical and operational business needs of companies and organization in combination with effective and efficient requirements ...
Business Analysis for Projects
After completion of the course, students will be able to: Understand the principles, tools and techniques and the processes to conduct business analysis in support of projects. Explain the importance of business ...
Business Process Management
After completion of the course, students will be able to: Understand the basic principles of business process management Become familiar with the key terms and concepts in BPM Learn the major approaches and ...
BPMN 2.0
After completion of the course, students will be able to: Understand the value that BPMN brings to process modeling Understand the opportunities and challenges of adopting BPMN Learn the semantics of the BPMN shapes ...
Teorija Informacione Bezbednosti (Information Sec. Theory)
Trening je namenjen polaznicima koji žele da se upoznaju sa načinima, tehnikama i alatima za izvođenje napada, samim napadima i pretnjama po IT infrastrukturu i operativno poslovanje, te tehnikama i načinima odbrane ...
Certified Information SystemsSecurity Professional
This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and ...