Internetworking Basics
This is a theoretical course aimed to demonstrate basic principles and technologies of data networks. A graduate gets a general overview of internetworking and OSI model and learns basics of the TCP/IP suite of ...
BGP Configuration and Design
Introduction and processing in the BGP routing protocol and its components. Design and implementation of BGP routing, filtering and path selection optimization on Cisco IOS routers.
Advanced administration of CUCM and signaling protocols
By completion of this course participant will understand the internal processes of voice gateway, will be able to analyze calls passing through the voice gateway, which is necessary to implement, operate and possibly ...
Configuration of Switches
The course is designed for participants who need to acquire basic theoretical and practical (configuration) knowledge of Cisco switches used in Ethernet LAN networks. After completing, the participant will be ...
Veeam Availability Suite v11: Configuration and Management
After completing this course, attendees should be able to: Describe Veeam security concepts Given a scenario, configure a backup job and a backup copy job Explain network-attached storage (NAS) backups and ...
Open Agile Architecture
Open Agile Architecture (O-AA) is a brand new standard published by The Open Group in the second half of 2020. It contains a lot of useful techniques for agile and digital transformation of the architecture of the ...
Microsoft 365 - Teams Administrator Associate
In this course, you will learn how to manage Microsoft Teams in your organizations. The course covers Microsoft Teams overview, implementing governance, security and compliance for Microsoft Teams, preparing the ...
L1 (Foundation) TOGAF® 10
The course is focused on detail explanation of TOGAF - the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
Microsoft Identity and Access Administrator
This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and it ...
Microsoft Security, Compliance, and Identity Fundamentals
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions..
L1 (Foundation) ArchiMate 3.2
The course guides you through the ArchiMate modeling language - standard for Enterprise architecture explaining usage of all elements, relationships and other concepts using real examples from multiple industries.