Teorija Informacione Bezbednosti (Information Sec. Theory)
Trening je namenjen polaznicima koji žele da se upoznaju sa načinima, tehnikama i alatima za izvođenje napada, samim napadima i pretnjama po IT infrastrukturu i operativno poslovanje, te tehnikama i načinima odbrane ...
Team leadership
How to lead a team? How to develop a team? Great leaders know how to create and develop team. Great leaders know that true value of a team is much more that a basic sum of values of individuals from the team.
Stress management
Stress is a constant in a life of a modern man, and especially in a time like these, we need to find a way to cope with it. If we do not learn to manage our stress, we put ourselves on a path that leads to anxiety, ...
Psychology of communication
This training is based on Transactional Analysis (TA). TA is a psychological theory, developed by Eric Berne in the 1960s, that helps explain why we think, act and feel the way we do.
Project Portfolio Management
After completion of the course, students will be able to: Relate projects to an organization's strategic objectives Define what is involved in project prioritization in large, complex organizations Know how to ...
PRINCE2 - Projects in Controlled Environments Course
After completion of the course, students will be able to: Understand key concepts relating to projects and PRINCE2 Understand how the PRINCE2 principles underpin the PRINCE2 method Understand the PRINCE2 themes and ...
Negotiation skills
What is the easiest and the quickest way to earn more or to save more money? The answer is simple - to be better in negotiating. We all negotiate almost every dan, both at work and at home, but we do it without ...
IT for non IT
Teoretical training is focused on general public and in a very complex way provides information about current IT enviroment. You will see, which technologies are currently available, which of them are the most ...
Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Configuring BIG-IP Access Policy Manager
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.