Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Technology Cancel filter
Location
Language
Difficulty
Wireless LAN fundamentals
Describe the fundamentals of wireless networks with focus on Cisco Unified Wireless Network. To learn how to install, configure, troubleshoot, monitor and maintain basic Cisco Wireless LAN solutions based on IOS-XE ...
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
Advanced WLAN configuration on Catalyst 9800
Advanced configuration, monitoring, maintaining and troubleshooting on Cisco Wireless LAN solutions based on IOS-XE platform (Catalyst 9800 & 9100). Advanced features and architectures including wireless security.
Configuration of Cisco Prime Infrastructure 3.x
This course provide information about new Cisco product for monitoring and network management - Cisco Prime Infrastructure. It is the advanced course about the basic work with this software.
TRN_WL3
The goal of this course is to provide the students with overall information about the Cisco Meraki technology and products. During the two days of this training, students will become familiar with the Cisco Meraki ...
Úvod do Threat Huntingu
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Infraštruktúra vrejného kľúča a AD Certificate Services
Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their metadata.