Implementing Videoconferencing in the Unified Collaboration
The seminar is designed for participants who have completed a seminar COLLAB 1. The objective of this four day seminar is to update the participants how to properly proceed in the implementation and administration of ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Configuring VoIP on Cisco Products
This 4-day seminar contains theoretical as well as practical sections, that will present to the participants how analog voice networks, VoIP networks and Video communication do function.
Advanced administration of CUCM and signaling protocols
By completion of this course participant will understand the internal processes of voice gateway, will be able to analyze calls passing through the voice gateway, which is necessary to implement, operate and possibly ...
SIP deep dive
In today's Unified Communications networks, SIP protocol is used whether for communication between endpoints, but also between different server systems. In this course, the participants will 'dive' into theoretical ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Implementing Cisco Collaboration Conferencing
The Implementing Cisco Collaboration Conferencing (CLCNF) v1.0 course focuses on Cisco® on-premises conferencing architecture and solutions. You will gain knowledge and skills to design and ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
Cisco SD-WAN Operation and Deployment
The Cisco SD-WAN Operation and Deployment (SDWFND) v1.0 course provides an overview of the Cisco® Software-Defined WAN (SD-WAN) solution and SD-WAN components. You will learn how to create, manage, and operate a ...
Implementing Cisco SD-WAN Solutions
The Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0 course gives you training about how to design, deploy, configure, and manage your Cisco ® Software-Defined WAN (SD-WAN) solution in a large-scale live network, ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Impl. and Troubl. Networks Using Cisco ThousandEyes
The Implementing and Troubleshooting Networks Using Cisco ThousandEyes (ENTEIT) course is designed to introduce you to and familiarize you with Cisco® ThousandEyes. Through a combination of lectures and hands-on ...