TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
Configuration of Switches
The course is designed for participants who need to acquire basic theoretical and practical (configuration) knowledge of Cisco switches used in Ethernet LAN networks. After completing, the participant will be ...
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
BGP Configuration and Design
Introduction and processing in the BGP routing protocol and its components. Design and implementation of BGP routing, filtering and path selection optimization on Cisco IOS routers.
Implementing and Operating Cisco Security Core Technologies
This is the main course, which is designed to prepare for CCNP Security certification, and the test from this course is also used to complete the CCIE Security lab. This five-day course will prepare network security ...
Configuring VoIP on Cisco Products
This 4-day seminar contains theoretical as well as practical sections, that will present to the participants how analog voice networks, VoIP networks and Video communication do function.
VMware vSphere: Operate, Scale and Secure [V8]
This five-day course will teach you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a combination of lectures and hands-on exercises, you will configure ...
TRN_VM_VSTS8
By the end of the course, you should be able to meet the following objectives: • Introduce troubleshooting principles and procedures • Use command-line interfaces, log files, and the vSphere Client to diagnose and ...
Microsoft Power Platform Developer
The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes. In this course, students will learn how to build Power Apps, ...
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention ...
L1 (Foundation) TOGAF® 10
The course is focused on detail explanation of TOGAF - the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
VMware NSX: Install,Configure, Manage [V4.0]
This five-day intensive course provides comprehensive training for installing, configuring and managing VMware NSX® environments. This course covers the key features and functionality offered in NSX 4.
Veeam Availability Suite v11: Configuration and Management
The Veeam® Backup & Replication™ v12.1: Configure, Manage and Recover training course is a four-day technical course focused on teaching IT professionals the skills to configure, manage and support a Veeam ...