Sort by
Filter
Online / Onsite
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Location
Difficulty
TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
L1 (Foundation) TOGAF® 10
The course is focused on detail explanation of TOGAF - the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Veeam Availability Suite v11: Configuration and Management
The Veeam® Backup & Replication™ v12.1: Configure, Manage and Recover training course is a four-day technical course focused on teaching IT professionals the skills to configure, manage and support a Veeam ...
L1 (Foundation) ArchiMate 3.2
The course guides you through the ArchiMate modeling language - standard for Enterprise architecture explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
QoS Implementation on Cisco Devices
To identify, describe, and correctly implement the appropriate QoS mechanisms required to create an effective administrative policy providing QoS..
Open Agile Architecture
Open Agile Architecture (O-AA) is a brand new standard published by The Open Group in the second half of 2020. It contains a lot of useful techniques for agile and digital transformation of the architecture of the ...
VMware vSphere: Install, Configure, Manage V8.0
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to ...
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
CompTIA Cybersecurity Analyst- CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
TRN_OTH_5G_A
The aim of this course is to deepen the knowledge of graduates familiar with the functions of the 5G system. students will get acquainted with more detailed information about the construction of their own core, radio ...
Infraštruktúra vrejného kľúča a AD Certificate Services
Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their metadata.