Sort by
Filter
Online / Onsite
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Location
Difficulty
TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
Data Networks Security
The course is best suited for network administrators and network security engineers. The participants wil learn the basic principles of network security and its implementation of Cisco routers.
ASA Firewall
This is a basic Cisco ASA firewall configuration course. This five-day course will prepare network security engineers for the basic skills and knowledge needed to configure Cisco ASA firewalls.
QoS Implementation on Cisco Devices
To identify, describe, and correctly implement the appropriate QoS mechanisms required to create an effective administrative policy providing QoS..
TRN_S4
Course S4 is a three-days instructor-led course primarily aimed for engineers responsible for VPN configuration on Cisco routers. Course is covering IPSec VPN technology needed for secure data transfer.
VMware vSphere: Install, Configure, Manage V8.0
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to ...
ICT trends
To introduce business-oriented staff with current developments in ICT world as a current and future trends. The training also contains current ICT terminology..
TRN_S3
The goal of the course is to learn key functionalities of Cisco FirePOWER Services. The curriculum provides the configuration and troubleshooting guidelines for implementation on ASA module.
TRN_SEC_MAL
The course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code, discovery of its main functionalities and implementation of relevant defensive ...
Windows Infrastructure and security
The goal of the training is to provide participants with an insight into the workings of basic on- premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...