Technology Cancel filter
The goal of this course is to provide the students with overall information about the Cisco Meraki technology and products. During the two days of this training, students will become familiar with the Cisco Meraki ...
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
Wireless LAN fundamentals
Describe the fundamentals of wireless networks with focus on Cisco Unified Wireless Network. To learn how to install, configure, troubleshoot, monitor and maintain basic Cisco Wireless LAN solutions based on AireOS ...
Advanced WLAN configuration on Catalyst 9800
Advanced configuration, monitoring, maintaining and troubleshooting on Cisco Wireless LAN solutions based on IOS-XE platform (Catalyst 9800 & 9100). Advanced features and architectures including wireless security.
Understanding Cisco Wireless Foundations
The Understanding Cisco Wireless Foundations (WLFNDU) v1.0 course gives you the knowledge and skills you need to position, plan, implement, operate, and manage a Cisco® wireless LAN (WLAN) network.
Configuration of Cisco Prime Infrastructure 3.x
This course provide information about new Cisco product for monitoring and network management - Cisco Prime Infrastructure. It is the advanced course about the basic work with this software.
Identify the need for security in software development projects Eliminate vulnerabilities in software Implement basic security mechanisms to protect users and data Use multiple testing methodologies to find and ...
Úvod do Threat Huntingu
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Understanding Cisco Cybersecurity Operations Fundamentals
The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) v1.0 course teaches you security concepts, common network and application operations and attacks, and the types of data needed to investigate ...