Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor
Technology Cancel filter
Location
Language
Difficulty
Advanced administration of CUCM and signaling protocols
By completion of this course participant will understand the internal processes of voice gateway, will be able to analyze calls passing through the voice gateway, which is necessary to implement, operate and possibly ...
SIP deep dive
In today's Unified Communications networks, SIP protocol is used whether for communication between endpoints, but also between different server systems. In this course, the participants will 'dive' into theoretical ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Implementing Cisco Collaboration Conferencing
The Implementing Cisco Collaboration Conferencing (CLCNF) v1.0 course focuses on Cisco® on-premises conferencing architecture and solutions. You will gain knowledge and skills to design and ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
Public Key Infra. and Active Directory Certificate Services
In this course, you will learn how to: Choose adequate cryptographic algorithms for operating your public key infrastructure. Grasp the technical nature of certificates and meaning of individual fields of their ...
Wi-Fi attacks and penetration testing
This course is introduction to Wi-Fi security testing and is meant for engineers that requires theoretical and practical knowledge to conduct security assessment on corporate and other Wi-Fi networks.
AI Robotics, Drone - UAV / UAS Practical Skills Building
Principals of UAVs and the Ground Control Station (UAS) Flight Safety and Check Regional Laws Flight Planning Software and Digital Data Storage USB Programmers / UART / JTAG System Hardware Architecture Software ...