Teorija Informacione Bezbednosti (Information Sec. Theory)
Trening je namenjen polaznicima koji žele da se upoznaju sa načinima, tehnikama i alatima za izvođenje napada, samim napadima i pretnjama po IT infrastrukturu i operativno poslovanje, te tehnikama i načinima odbrane ...
Team leadership
How to lead a team? How to develop a team? Great leaders know how to create and develop team. Great leaders know that true value of a team is much more that a basic sum of values of individuals from the team.
Stress management
Stress is a constant in a life of a modern man, and especially in a time like these, we need to find a way to cope with it. If we do not learn to manage our stress, we put ourselves on a path that leads to anxiety, ...
Psychology of communication
This training is based on Transactional Analysis (TA). TA is a psychological theory, developed by Eric Berne in the 1960s, that helps explain why we think, act and feel the way we do.
Project Portfolio Management
After completion of the course, students will be able to: Relate projects to an organization's strategic objectives Define what is involved in project prioritization in large, complex organizations Know how to ...
Prisma Access SASE Security:Design and Operation (EDU-318)
The Prisma Access SASE Security: Design and Operation (EDU-318) course describes Prisma Access Secure Access Service Edge (SASE) and how it helps organizations embrace cloud and mobility by providing network and ...
PRINCE2 - Projects in Controlled Environments Course
After completion of the course, students will be able to: Understand key concepts relating to projects and PRINCE2 Understand how the PRINCE2 principles underpin the PRINCE2 method Understand the PRINCE2 themes and ...
Panorama: Managing Firewalls at Scale (EDU-220)
Negotiation skills
What is the easiest and the quickest way to earn more or to save more money? The answer is simple - to be better in negotiating. We all negotiate almost every dan, both at work and at home, but we do it without ...
IT for non IT
Teoretical training is focused on general public and in a very complex way provides information about current IT enviroment. You will see, which technologies are currently available, which of them are the most ...
Firewall: Troubleshooting (EDU-330)
The Palo Alto Networks Firewall 10.0: Troubleshooting course is three days of instructor-led training that will help you: Investigate networking issues using firewall tools including the CLI Follow proven ...
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
Cortex XDR:Prevention,Analysis ,and Response (EDU-260)
This course is three days of instructor-led training that will help you to: Differentiate the architecture and components of the Cortex XDR family Describe Cortex, Cortex Data Lake, the Customer Support Portal, and ...
Certified Information SystemsSecurity Professional
This training course is intended for professionals who have at least 5 years of recent full-time professional work experience in 2 or more of the 8 domains of the CISSP CBK and are pursuing CISSP training and ...