Sort by
Filter
Online / Onsite
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Location
Language
Difficulty Cancel filter
TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
Data Networks Security
The course is best suited for network administrators and network security engineers. The participants wil learn the basic principles of network security and its implementation of Cisco routers.
TRN_DC-S1
DC-S1 is a theoretical course aimed to demonstrate basic principles and technologies of storage area networks. A graduate gets a general overview of Fibre Channel technology, including terminology, design, way of ...
TRN_DC-S2
Participants will learn how to use and configure several more advanced Fibre Channel technology and Cisco MDS/Nexus switches features, e.g. Inter-VSAN routing, Enhanced Zoning, etc.
TRN_DC-V1
Server virtualization is a key component in modern Data Centers, however, it is also a powerful IT tool for a simple and fast-provisioned environment for testing and deploying a variety of applications.
TRN_DC-N71
This course is designed for technical professionals who are responsible for basic installations, configurations, and operation of Cisco Nexus 7000 in Data Center environment. Upon completion of this course, you ...
TRN_DC-N72
This course is for technical professionals who need to know how to design, configure advanced features of Cisco Nexus 7000 in data center environment. The course is primary focused on advanced features such as OTV, ...
Windows Infrastructure and security
The goal of the training is to provide participants with an insight into the workings of basic on- premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Infraštruktúra vrejného kľúča a AD Certificate Services
Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their metadata.