Technology Cancel filter
Implementing and Configuring the Cisco Identity Serv. Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
Data Networks Security
The course is best suited for network administrators and network security engineers. The participants wil learn the basic principles of network security and its implementation of Cisco routers.
This is a basic Cisco ASA firewall configuration course. This five-day course will prepare network security engineers for the basic skills and knowledge needed to configure Cisco ASA firewalls.
Advanced VPN for Cisco Routers
S4 is a four-day instructor-led course focused on VPN configuration of Cisco technologies. The curriculum covers detailed explanation of IPsec and IKEv2 protocol. The course also introduces the concept of IPsec VPN ...
Securing the Web with Cisco Web Security Appliance
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort web security appliances to successfully manage and troubleshoot web traffic in the enterprise network.
Implementing Secure Solutions with Virtual Private Networks
In this training, participants will learn how to secure data that goes through a network infrastructure by implementing a VPN solution built on Cisco products. Participants will gain experience in configuring ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Administration NGINX plus and NAP
ALEF NGINX+ and NGINX App Protect(NAP) course provides you the foundation to the administering NGINX+ and NAP. In the lectures and hands-on lab activities you will administer NGINX+ and NAP, using NGINX commands and ...
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...