Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
BIG-IP Global Traffic Manager
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Teorija Informacione Bezbednosti (Information Sec. Theory)
Trening je namenjen polaznicima koji žele da se upoznaju sa načinima, tehnikama i alatima za izvođenje napada, samim napadima i pretnjama po IT infrastrukturu i operativno poslovanje, te tehnikama i načinima odbrane ...
Certified Information SystemsSecurity Professional
This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and ...