Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Technology Cancel filter
Location
Language
Difficulty
QoS Implementation on Cisco Devices
To identify, describe, and correctly implement the appropriate QoS mechanisms required to create an effective administrative policy providing QoS..
Úvod do Threat Huntingu
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Understanding Cisco Cybersecurity Operations Fundamentals
The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate ...
TRN_OTH_5G_A
The aim of this course is to deepen the knowledge of graduates familiar with the functions of the 5G system. students will get acquainted with more detailed information about the construction of their own core, radio ...
Infraštruktúra vrejného kľúča a AD Certificate Services
Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their metadata.