TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
TRN_WL3
The goal of this course is to provide the students with overall information about the Cisco Meraki technology and products. During the three days of this training, students will become familiar with the Cisco Meraki ...
Azure Data Engineer Associate
In this course, the student will learn about the data engineering as it pertains to working with batch and real-time analytical solutions using Azure data platform technologies. Students will begin by understanding ...
Azure Network Engineer Associate
This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. This course covers the process of designing, implementing, and managing core Azure networking infrastructure, ...
Wireless LAN fundamentals
Describe the fundamentals of wireless networks with focus on Cisco Unified Wireless Network. To learn how to install, configure, troubleshoot, monitor and maintain basic Cisco Wireless LAN solutions based on IOS-XE ...
Advanced WLAN configuration on Catalyst 9800
Advanced configuration, monitoring, maintaining and troubleshooting on Cisco Wireless LAN solutions based on IOS-XE platform (Catalyst 9800 & 9100) including advanced features and functionalities, central ...
Configuration of Cisco Prime Infrastructure 3.x
This course provide information about new Cisco product for monitoring and network management - Cisco Prime Infrastructure. It is the advanced course about the basic work with this software.
Infraštruktúra vrejného kľúča a AD Certificate Services
Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their metadata.
AI Robotics, Drone - UAV / UAS Practical Skills Building
Wi-Fi Penetration
This course is introduction to Wi-Fi security testing and is meant for engineers that requires theoretical and practical knowledge to conduct security assessment on corporate and other Wi-Fi networks.