Sort by
Filter
Online / Onsite
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Location
Language
Difficulty
Windows Infrastructure and security
The goal of the training is to provide participants with an insight into the workings of basic on- premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
TRN_OTH_5G_A
The aim of this course is to deepen the knowledge of graduates familiar with the functions of the 5G system. students will get acquainted with more detailed information about the construction of their own core, radio ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Administrácia NGINX plus and NAP
ALEF NGINX+ and NGINX App Protect(NAP) course provides you the foundation to the administering NGINX+ and NAP. In the lectures and hands-on lab activities you will administer NGINX+ and NAP, using NGINX commands and ...
Basic VXLAN EVPN in NX-OS mode
Have you ever wondered how to build modern Data Center? VXLAN EVPN is one of most frequently used methods worldwide. As a technology based on standards is compatible between all Nexus devices supporting VXLAN and ...
Advanced VXLAN EVPN in NX-OS mode
This training further develops knowledge gained in DC BASIC VXLAN with focus on advanced topics related to interconnecting Data Centers using VXLAN EVPN, building multicast VPNs, integrating L4-L7 services, ...
Cisco ACI & Kubernetes Networking
The major trend in a datacenter networking is currently centrally managed network, fulfilling all the requirements of modern applications – from a huge data throughput, simple scalability, enhanced security for any ...
Implementing & Troubleshooting ACI Security
The Cisco ACI platform itself can provide many features related to (micro)segmentation, network traffic filtering, or simply incorporate specialized security devices into the path between internal and external endpoints.