Sortiraj po
Filter
Online / Onsite Otkaži filter
Guaranteed term
Vendor Otkaži filter
Lokacija
Jezik
Basics of Data ONTAP C-Mode Administration
Goal of this course is to teach basic administration of clustered Data ONTAP, using lectures and hands-on exercises. Students will configure and manage a Data ONTAP cluster so after course they will be able manage ...
Microsoft Cloud 365 Mobility and Security
This three-MOC packaged set aligned to Microsoft 365 Exam: Microsoft 365 Mobility and Security contains courseware that helps prepare students for Exams MS-101. Passing this exam is required to earn the Microsoft 365 ...
Microsoft 365 Security Administration
Microsoft 365 Certified: Security Administrator Associate Microsoft 365 Security Administrators proactively secure M365 enterprise and hybrid environments, implement and manage security and compliance solutions, ...
Agile Business Analysis
After completion of the course, students will be able to: Review techniques to perform the agile requirements management process, applying fundamental agile principles. Identify important competencies of a business ...
Agile Project Management
After completion of the course, students will be able to: Learn how agile project management techniques can help to ensure project success Learn when agile is a good fit and when it is still appropriate to use a ...
Business Analysis forOrganizations
After completion of the course, students will be able to: Analyze the strategic, tactical and operational business needs of companies and organization in combination with effective and efficient requirements ...
Business Analysis for Projects
After completion of the course, students will be able to: Understand the principles, tools and techniques and the processes to conduct business analysis in support of projects. Explain the importance of business ...
Business Process Management
After completion of the course, students will be able to: Understand the basic principles of business process management Become familiar with the key terms and concepts in BPM Learn the major approaches and ...
BPMN 2.0
After completion of the course, students will be able to: Understand the value that BPMN brings to process modeling Understand the opportunities and challenges of adopting BPMN Learn the semantics of the BPMN shapes ...
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments. Analyze the cybersecurity threat landscape. Analyze reconnaissance threats to ...
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
CompTIA Security+
Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI .
Teorija Informacione Bezbednosti (Information Sec. Theory)
Trening je namenjen polaznicima koji žele da se upoznaju sa načinima, tehnikama i alatima za izvođenje napada, samim napadima i pretnjama po IT infrastrukturu i operativno poslovanje, te tehnikama i načinima odbrane ...
Certified Information SystemsSecurity Professional
This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and ...