Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
VMware Horizon Mirage: Install, Configure, Manage
Install and configure Horizon Mirage components. Demonstrate how to navigate and use Horizon Mirage Management Console. Identify the process for deploying Horizon Mirage to endpoints.
vCenter Site Recovery Manager: Install, Configure, Manage
This two-day, hands-on training course gives experienced VMware vSphere® administrators the knowledge to install, configure, and manage VMware Site Recovery Manager™ 8.2. This course also shows you how to write and ...
Nexus Programmability
To introduce participants to various options and tools for development of own applications used to automate configuration and monitoring on a Nexus(NX-OS) platform. Participants will gain practical experience with ...
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
ACI Programmability
The course will introduce participants to various options and tools for development of their own applications used to automate configuration and monitoring of ACI architecture. Participants will gain practical ...
Designing Cisco Data Center Infrastructure
This course focuses on design and deployment options of Cisco data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security.
Troubleshooting Cisco Data Center Infrastructure
This course course shows you how to troubleshoot LAN, SAN, Cisco Data Center Unified Fabric, Cisco Unified Computing System (UCS), and Cisco Application-Centric Infrastructure (ACI).
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security tests Detect the most common web application vulnerabilities Perform social engineering penetration tests Analyze e-mail ...
Introduction to Server Virtualization
Server virtualization is a key component in modern Data Centers, however, it is also a powerful IT tool for a simple and fast-provisioned environment for testing and deploying a variety of applications.
Secure coding
Identify the need for security in software development projects Eliminate vulnerabilities in software Implement basic security mechanisms to protect users and data Use multiple testing methodologies to find and ...
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Implementing Cisco Adv. Call Control and Mobility Services
The Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) v1.0 course covers advanced call control and mobility services. You will learn how to use Cisco® Unified Communications Manager features to ...
Implementing Cisco Collab. Cloud and Edge Solutions
The Implementing Cisco Collaboration Cloud and Edge Solutions (CLCEI) v1.0 course provides you with knowledge about Cisco® Expressway Series solutions enabling business-to-business (B2B) calls, Cisco Mobile, remote ...