Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Location
Language
Difficulty
Implementing and Configuring the Cisco Identity Serv. Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Securing the Web with Cisco Web Security Appliance
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort web security appliances to successfully manage and troubleshoot web traffic in the enterprise network.
TRN_SO_VYJ
You'll participate in 4 practical negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll see short films of negotiators and you'll learn from their ...
Implementing Secure Solutions with Virtual Private Networks
In this training, participants will learn how to secure data that goes through a network infrastructure by implementing a VPN solution built on Cisco products. Participants will gain experience in configuring ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Securing Networks with Cisco Firepower Next Gen. Firewall
The goal of this course is to provide you with a solid foundation in Firepower Threat defense NGFW technology. You will gain the competency and skills required to implement and manage a Firepower system regardless ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
FBI negotiator training with Radim Parik
Negotiate. There are some of the most difficult negotiations ahead of you. We will prepare you for them. During a 3-day intensive training course, we will form a negotiation team, and prepare your strategy and demands.
Rhetoric and influence with Radim Parik
Interpersonal communication. Key skills for business owners, executive officers, individual managing directors and top management. And for all who wish to pursue a management position.
Sales Negotiator Officer negotiation training with A. Dolejs
Lead, trade, negotiate. You are the key to success, to the client and to money. You are under great pressure to deliver, not reaching an agreement is not an alternative, you can not afford to make mistakes at the ...
FBI negotiation for women
Negotiation is all about focusing on your objective, about opportunities, about internal struggle, about courage, and about the right mindset and strategy. About the used tactics, about emotions, and about you.