Sort by
Filter
Online / Onsite
Guaranteed term
Technology Cancel filter
Location
Language
Difficulty
VMware vSphere: Install, Configure, Manage [V8]
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to ...
AI Robotics, Drone - UAV / UAS Practical Skills Building
Principals of UAVs and the Ground Control Station (UAS) Flight Safety and Check Regional Laws Flight Planning Software and Digital Data Storage USB Programmers / UART / JTAG System Hardware Architecture Software ...
Microsoft 365 Administrator Essentials
This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance.
Microsoft 365 Endpoint Administrator
In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern ...
ICT trends
Current ICT trends served in the two-day training session that focuses on the market as a whole, and no technology is preferred. The training introduces to attendees the past and nowadays fast development of the ICT ...
Cisco Cloud Managed Networking using Cisco Meraki
The goal of this course is to provide the students with overall information about the Cisco Meraki technology and products. During the three days of this training, students will become familiar with the Cisco Meraki ...
Wireless LAN fundamentals
Describe the fundamentals of wireless networks with focus on Cisco Unified Wireless Network. To learn how to install, configure, troubleshoot, monitor and maintain basic Cisco Wireless LAN solutions based on IOS-XE ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
Secure coding
Identify the need for security in software development projects Eliminate vulnerabilities in software Implement basic security mechanisms to protect users and data Use multiple testing methodologies to find and ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Advanced WLAN configuration on Catalyst 9800
Advanced configuration, monitoring, maintaining and troubleshooting on Cisco Wireless LAN solutions based on IOS-XE platform (Catalyst 9800 & 9100). Advanced features and architectures including wireless security.
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Wireless transmission networks - from 0G to 5G
The aim of this course is to deepen the knowledge of graduates familiar with the functions of the 5G system. students will get acquainted with more detailed information about the construction of their own core, radio ...