Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Technology Cancel filter
Location
Language
Difficulty
Secure coding
Identify the need for security in software development projects Eliminate vulnerabilities in software Implement basic security mechanisms to protect users and data Use multiple testing methodologies to find and ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Nutanix HCI Architecture and Operations
Gain knowledge of present-day data center technologies through the prism of Nutanix Architecture, pioneering and leading HCI vendor. WHY ATTEND: A meaningful, technical course without marketing slides with an ...
Advanced WLAN configuration on Catalyst 9800
Advanced configuration, monitoring, maintaining and troubleshooting on Cisco Wireless LAN solutions based on IOS-XE platform (Catalyst 9800 & 9100). Advanced features and architectures including wireless security.
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Cisco ACI - Troubleshooting and Operations
Cisco Application Policy Infrastructure Controller (APIC) provides its administrators wide monitoring, management and troubleshooting tools for ACI. Goal of this training is to familiarize participants with all of ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Basic VXLAN EVPN in NX-OS mode
Have you ever wondered how to build modern Data Center? VXLAN EVPN is one of most frequently used methods worldwide. As a technology based on standards is compatible between all Nexus devices supporting VXLAN and ...
Cisco ACI & Kubernetes Networking
The major trend in a datacenter networking is currently centrally managed network, fulfilling all the requirements of modern applications - from a huge data throughput, simple scalability, enhanced security for any ...
Data Protection
Data Protection is a course that provides a basic overview of the data protection techniques and procedures stored and maintained by organization. The course ranges from threat identification through the technologies ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
Implementing & Troubleshooting ACI Security
The Cisco ACI platform itself can provide many features related to (micro)segmentation, network traffic filtering, or simply incorporate specialized security devices into the path between internal and external endpoints.