TRN_VM_VSTS8
By the end of the course, you should be able to meet the following objectives: • Introduce troubleshooting principles and procedures • Use command-line interfaces, log files, and the vSphere Client to diagnose and ...
L1 (Foundation) TOGAF® 10
The course is focused on detail explanation of TOGAF - the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
TRN_F5_LTMC
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
TRN_SISE
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
TRN_DCACIA
In this training, we will teach participants how to take advantage of the capabilities of Cisco Nexus 9000 switches in Cisco ACI (Application Centric Infrastructure) mode. Participants will learn how to configure and ...
TRN_DCIT
The Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 course shows you how to troubleshoot LAN, SAN, Cisco® Data Center Unified Fabric, Cisco Unified Computing System™ (Cisco UCS®), and Cisco ...
L1 (Foundation) ArchiMate 3.2
The course guides you through the ArchiMate modeling language - standard for Enterprise architecture explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
Fundamental of Cisco Firewall Threath Def. and Intrus. Prev.
This course SFWIPF (Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention) is an updated version of the SSNGFW course. The goal of this course is to provide you with a solid foundation in Firepower ...
TRN_VMW_VSFT8
This five-day, extended-hour course will take you from basic to advanced knowledge of managing VMware vSphere® 8. Building on the installation and configuration content from our best-selling ICM course, you'll also ...
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
Implementing Cisco Application Centric Infrastructure
In this training, participants will learn how to deploy and manage the Cisco Nexus 9000 series switches in Cisco ACI (Application Centric Infrastructure) mode. The course gives you the knowledge and skills to ...
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
Implementing and Operating Cisco Security Core Technologies
This is the main course, which is designed to prepare for CCNP Security certification, and the test from this course is also used to complete the CCIE Security lab. This five-day course will prepare network security ...
Configuring Cisco Unified Computing System
The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System (Cisco UCS) B-series blade servers, Cisco UCS C-Series, and S-Series ...