Technology Cancel filter
Advanced administration of CUCM and signaling protocols
By completion of this course participant will understand the internal processes of voice gateway, will be able to analyze calls passing through the voice gateway, which is necessary to implement, operate and possibly ...
Implementing Videoconferencing in the Unified Collaboration
The seminar is designed for participants who have completed a seminar COLLAB 1. The objective of this four day seminar is to update the participants how to properly proceed in the implementation and administration of ...
SIP deep dive
In today's Unified Communications networks, SIP protocol is used whether for communication between endpoints, but also between different server systems. In this course, the participants will 'dive' into theoretical ...
The seminar is intended for participants who want to learn about Cisco Webex communication platform. It's suitable for end users as well as administrators and sales representatives.
Basics of Cisco Unified Collaboration implementation
The seminar is designed for participants who want to familiarize deeper with the Collaboration technology, mainly focused on the basic principles of operation and implementation of voice and video calls.
Configuring VoIP on Cisco Products
This 4-day seminar contains theoretical as well as practical sections, that will present to the participants how analog voice networks, VoIP networks and Video communication do function.
Cisco Unified Collaboration - Advanced Configuration
The seminar is designed for participants who completed seminars COLLAB 1 and VOICE1 and want to expand the knowledge gained from these seminars. The objective of this five day seminar is to update the participants ...
The contents of this seminar is familiarization with products and services in voice as well as video networks. We will take a look at the issues and specifications of traditional analog networks, following the ...
Identify the need for security in software development projects Eliminate vulnerabilities in software Implement basic security mechanisms to protect users and data Use multiple testing methodologies to find and ...
Úvod do Threat Huntingu
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
The aim of this course is to deepen the knowledge of graduates familiar with the functions of the 5G system. students will get acquainted with more detailed information about the construction of their own core, radio ...