Red Hat Enterprise Linux Automation with Ansible
Learn how to automate Linux system administration tasks with Red Hat Ansible Automation Platform Red Hat Enterprise Linux Automation with Ansible (RH294) is designed for Linux system administrators and developers ...
Implementing and AdministeringCisco Solutions
The Implementing and Administering Cisco Solutions (CCNA) v1.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will ...
Implementing Cisco EnterpriseAdvanced Routing and Services
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network.
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments. Analyze the cybersecurity threat landscape. Analyze reconnaissance threats to ...
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
QoS Implementation on Cisco Devices
To identify, describe, and correctly implement the appropriate QoS mechanisms required to create an effective administrative policy providing QoS..
Enhanced administration ofCUCM and signaling protocols
Basic Implementation of Cisco Unified Collaboration
Advance Configuration of Cisco Unified Collaboration
Implementation of videoconfererencing solutions in CiscoUC
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
CompTIA Security+
Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI .
Teorija Informacione Bezbednosti (Information Sec. Theory)
Trening je namenjen polaznicima koji žele da se upoznaju sa načinima, tehnikama i alatima za izvođenje napada, samim napadima i pretnjama po IT infrastrukturu i operativno poslovanje, te tehnikama i načinima odbrane ...