L1 (Foundation) TOGAF® 10
The course is focused on detail explanation of TOGAF - the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
TRN_F5_LTMC
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
L1 (Foundation) ArchiMate 3.2
The course guides you through the ArchiMate modeling language - standard for Enterprise architecture explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
Open Agile Architecture
Open Agile Architecture (O-AA) is a brand new standard published by The Open Group in the second half of 2020. It contains a lot of useful techniques for agile and digital transformation of the architecture of the ...
TRN_F5_IRULES
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
CompTIA Cybersecurity Analyst- CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
ICT trends
To introduce business-oriented staff with current developments in ICT world as a current and future trends. The training also contains current ICT terminology..