Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Location
Language
Difficulty Cancel filter
SD-WAN
The target of this course is, to introduce the student into SD-WAN world, explain to him the importance of each SD-WAN component and their logical and functional correlation. The initial service deployment is also ...
BGP MPLS-based Ethernet VPNs (E-VPN)
The course is intended for technicians familiar with MPLS technology and MPLS VPN, who need to expand their knowledge. The course introduces the advanced capabilities of Ethernet VPN (EVPN) over MPLS, their ...
Nutanix HCI Architecture and Operations
Gain knowledge of present-day data center technologies through the prism of Nutanix Architecture, pioneering and leading HCI vendor. WHY ATTEND: A meaningful, technical course without marketing slides with an ...
Cisco ACI - Troubleshooting and Operations
Cisco Application Policy Infrastructure Controller (APIC) provides its administrators wide monitoring, management and troubleshooting tools for ACI. Goal of this training is to familiarize participants with all of ...
Wireless transmission networks - from 0G to 5G
The aim of this course is to deepen the knowledge of graduates familiar with the functions of the 5G system. students will get acquainted with more detailed information about the construction of their own core, radio ...
Basic VXLAN EVPN in NX-OS mode
Have you ever wondered how to build modern Data Center? VXLAN EVPN is one of most frequently used methods worldwide. As a technology based on standards is compatible between all Nexus devices supporting VXLAN and ...
Cisco ACI & Kubernetes Networking
The major trend in a datacenter networking is currently centrally managed network, fulfilling all the requirements of modern applications - from a huge data throughput, simple scalability, enhanced security for any ...
Implementing & Troubleshooting ACI Security
The Cisco ACI platform itself can provide many features related to (micro)segmentation, network traffic filtering, or simply incorporate specialized security devices into the path between internal and external endpoints.