Online / Onsite
Vendor Otkaži filter
NetApp Data ONTAP performance troubleshooting deep dive
Understand NetApp Data ONTAP internals and their impact on a storage array performance. Introduction to perfromance troubleshooting tools and practical show-cases..
Basics of Data ONTAP C-Mode Administration
Goal of this course is to teach basic administration of clustered Data ONTAP, using lectures and hands-on exercises. Students will configure and manage a Data ONTAP cluster so after course they will be able manage ...
Configuring BIG-IP Access Policy Manager v11
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.
BIG-IP Global Traffic Manager v11x
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
Developing iRules for BIG-IP v11
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Kemp basics for partners
KEMP certified sales & KEMP certified engineer. Osnove prodaje i tehnički trening za postizanje Kemp Authorized Partner statusa..
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments. Analyze the cybersecurity threat landscape. Analyze reconnaissance threats to ...