Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Technology Cancel filter
Location
Language
Difficulty
VMware vSphere: Install, Configure, Manage [V8]
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to ...
L1 (Foundation) TOGAF 9.2
The course is focused on detail explanation of TOGAF – the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
Security of industrial systems and OT environments
This one-day course provides introduction into the world of cyber security of industrial, control and specific systems and OT environments. During it, trainees will learn about relevant standards in this area, and ...
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
TRN_ SPCOR
After taking this training, you should be able to: Describe the Service Provider network architectures, concepts, and transport technologies Describe the Cisco Internetwork Operating System (Cisco IOS®) software ...
ICT trends
Current ICT trends served in the two-day training session that focuses on the market as a whole, and no technology is preferred. The training introduces to attendees the past and nowadays fast development of the ICT ...
L1 (Foundation) for ArchiMate 3.1
The course guides you through the ArchiMate modeling language – standard for Enterprise architecture – explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
TRN_SO_VYJ
You'll participate in 4 practical negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll see short films of negotiators and you'll learn from their ...
Secure coding
Identify the need for security in software development projects Eliminate vulnerabilities in software Implement basic security mechanisms to protect users and data Use multiple testing methodologies to find and ...