TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
VMware vSphere: Operate, Scale and Secure [V8]
This five-day course will teach you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a combination of lectures and hands-on exercises, you will configure ...
AWS Technical Essentials
In this course, you will learn: Terminology and concepts related to the AWS platform How to navigate the AWS Management Console Key concepts of AWS security measures and AWS Identity and Access Management ...
VMware NSX: Install,Configure, Manage [V4.0]
This five-day intensive course provides comprehensive training for installing, configuring and managing VMware NSX® environments. This course covers the key features and functionality offered in NSX 4.
Architecting on AWS
In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly ...
VMware Horizon 8: Deploy and Manage
This five-day course gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware ...
VMware vSphere: Install, Configure, Manage V8.0
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to ...
TRN_F5_AFM
This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP® Advanced Firewall Manager system. Students are introduced to the AFM user ...
TRN_F5_APM
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.
ICT trends
To introduce business-oriented staff with current developments in ICT world as a current and future trends. The training also contains current ICT terminology..
TRN_SEC_MAL
The course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code, discovery of its main functionalities and implementation of relevant defensive ...