TRN_SESA
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort email security appliances to successfully manage and troubleshoot email traffic entering and leaving the enterprise ...
Advanced WLAN configuration on Catalyst 9800
Advanced configuration, monitoring, maintaining and troubleshooting on Cisco Wireless LAN solutions based on IOS-XE platform (Catalyst 9800 & 9100) including advanced features and functionalities, central ...
Power Platform Fundamentals
Learn the business value and product capabilities of Microsoft Power Platform. Create simple Power Apps, connect data with Dataverse, build a Power BI Dashboard, automate processes with Power Automate, and build a ...
TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
Understanding Cisco Wireless Foundations
The Understanding Cisco Wireless Foundations (WLFNDU) v1.0 course gives you the knowledge and skills you need to position, plan, implement, operate, and manage a Cisco® wireless LAN (WLAN) network.
Configuration of Switches
The course is designed for participants who need to acquire basic theoretical and practical (configuration) knowledge of Cisco switches used in Ethernet LAN networks. After completing, the participant will be ...
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
BGP Configuration and Design
Introduction and processing in the BGP routing protocol and its components. Design and implementation of BGP routing, filtering and path selection optimization on Cisco IOS routers.
Implementing and Operating Cisco Security Core Technologies
This is the main course, which is designed to prepare for CCNP Security certification, and the test from this course is also used to complete the CCIE Security lab. This five-day course will prepare network security ...
Configuring VoIP on Cisco Products
This 4-day seminar contains theoretical as well as practical sections, that will present to the participants how analog voice networks, VoIP networks and Video communication do function.
TRN_WL3
The goal of this course is to provide the students with overall information about the Cisco Meraki technology and products. During the three days of this training, students will become familiar with the Cisco Meraki ...
Implementing and Administering Cisco Solutions
This course gives you basic theory and practical knowledge of computer networks built on IPv4 and IPv6 protocols and provides a solid technical background for follow-up Cisco courses in all fields of technology.
Microsoft Power Platform Developer
The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes. In this course, students will learn how to build Power Apps, ...
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention ...