L1 (Foundation) TOGAF® 10
The course is focused on detail explanation of TOGAF - the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
TRN_F5_LTMC
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
L1 (Foundation) ArchiMate 3.2
The course guides you through the ArchiMate modeling language - standard for Enterprise architecture explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
Open Agile Architecture
Open Agile Architecture (O-AA) is a brand new standard published by The Open Group in the second half of 2020. It contains a lot of useful techniques for agile and digital transformation of the architecture of the ...
TRN_F5_AFM
This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP® Advanced Firewall Manager system. Students are introduced to the AFM user ...
TRN_F5_APM
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.
TRN_F5_IRULES
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
ICT trends
To introduce business-oriented staff with current developments in ICT world as a current and future trends. The training also contains current ICT terminology..
TRN_F5_DNS
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
TRN_SEC_MAL
The course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code, discovery of its main functionalities and implementation of relevant defensive ...