Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Location
Language
Difficulty
Configuring BIG-IP AFM: Advanced Firewall Manager
This course uses lectures and hands-on exercises to give participants real-time experience in setting up and configuring the BIG-IP® Advanced Firewall Manager system. Students are introduced to the AFM user ...
Configuring BIG-IP Access Policy Manager
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
TRN_SO_VYJ
You'll participate in 4 practical negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll see short films of negotiators and you'll learn from their ...
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Azure Administrator Associate
This course teaches IT Professionals how to secure identities, manage their Azure subscriptions, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network ...
Power Platform Fundamentals
Learn the business value and product capabilities of Microsoft Power Platform. Create simple Power Apps, connect data with Dataverse, build a Power BI Dashboard, automate processes with Power Automate, and build a ...
Microsoft Security, Compliance, and Identity Fundamentals
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions..
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
MS365-Overview of accounts and possibility of integration
Five days of instructor-led training preparing students for MS-100 certification exam. At course completion students will be able: Office 365 overview Moving your organization to Office 365 Configuring Office ...
Microsoft 365 - Expert: Enterprise Administrator 2
Four days of instructor-led training preparing students for MS-101 certification exam..
Microsoft 365 - Associate: Security Administrator
Four days of instructor-led training preparing students for MS-500 certification exam..