Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Difficulty
AI Robotics, Drone - UAV / UAS Practical Skills Building
Principals of UAVs and the Ground Control Station (UAS) Flight Safety and Check Regional Laws Flight Planning Software and Digital Data Storage USB Programmers / UART / JTAG System Hardware Architecture Software ...
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
IT for non IT
Theoretical course focused on non-professional attendees. In a fun and understandable way, the training will introduce you briefly to today's IT trends, how the Internet works, how does the enterprise IT looks like ...
Data Networks Security
The course is best suited for network administrators and network security engineers. The participants wil learn the basic principles of network security and its implementation of Cisco routers.
ASA Firewall
This is a basic Cisco ASA firewall configuration course. This five-day course will prepare network security engineers for the basic skills and knowledge needed to configure Cisco ASA firewalls.
Advanced VPN for Cisco Routers
S4 is a four-day instructor-led course focused on VPN configuration of Cisco technologies. The curriculum covers detailed explanation of IPsec and IKEv2 protocol. The course also introduces the concept of IPsec VPN ...
FirePOWER Services
The goal of the course is to learn key functionalities of Cisco FirePOWER Services. The curriculum provides the configuration and troubleshooting guidelines for implementation on ASA module.
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
Secure coding
Identify the need for security in software development projects Eliminate vulnerabilities in software Implement basic security mechanisms to protect users and data Use multiple testing methodologies to find and ...
Basics of Cisco Unified Collaboration implementation
The seminar is designed for participants who want to familiarize deeper with the Collaboration technology, mainly focused on the basic principles of operation and implementation of voice and video calls.
Cisco Unified Collaboration - Advanced Configuration
The seminar is designed for participants who completed seminars COLLAB 1 and VOICE1 and want to expand the knowledge gained from these seminars. The objective of this five day seminar is to update the participants ...
Implementing Videoconferencing in the Unified Collaboration
The seminar is designed for participants who have completed a seminar COLLAB 1. The objective of this four day seminar is to update the participants how to properly proceed in the implementation and administration of ...