Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Location
Language
Difficulty
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Cisco ACI - Troubleshooting and Operations
Cisco Application Policy Infrastructure Controller (APIC) provides its administrators wide monitoring, management and troubleshooting tools for ACI. Goal of this training is to familiarize participants with all of ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Practical Introduction to Cloud Environments
" Explain basic cloud environment principles with compare traditional IT " Public cloud vendors overview " Hybrid cloud solutions as a new way " Service models " Basic architecting ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Basic VXLAN EVPN in NX-OS mode
Have you ever wondered how to build modern Data Center? VXLAN EVPN is one of most frequently used methods worldwide. As a technology based on standards is compatible between all Nexus devices supporting VXLAN and ...
Cisco ACI & Kubernetes Networking
The major trend in a datacenter networking is currently centrally managed network, fulfilling all the requirements of modern applications - from a huge data throughput, simple scalability, enhanced security for any ...
Data Protection
Data Protection is a course that provides a basic overview of the data protection techniques and procedures stored and maintained by organization. The course ranges from threat identification through the technologies ...
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
Implementing & Troubleshooting ACI Security
The Cisco ACI platform itself can provide many features related to (micro)segmentation, network traffic filtering, or simply incorporate specialized security devices into the path between internal and external endpoints.
Wi-Fi attacks and penetration testing
This course is introduction to Wi-Fi security testing and is meant for engineers that requires theoretical and practical knowledge to conduct security assessment on corporate and other Wi-Fi networks.
AI Robotics, Drone - UAV / UAS Practical Skills Building
Principals of UAVs and the Ground Control Station (UAS) Flight Safety and Check Regional Laws Flight Planning Software and Digital Data Storage USB Programmers / UART / JTAG System Hardware Architecture Software ...