Windows Infrastructure Security
The goal of the training is to provide participants with an insight into the workings of basic on-premise infrastructure built on the Windows Server operating system and enrich their understanding of principles of ...
Introduction to Threat Hunting
This one-day technical training is an extension to the "Security monitoring and incident response" course and covers basic theoretical approaches and practical aspects of network and endpoint threat hunting.
L1 (Foundation) TOGAF 9.2
The course is focused on detail explanation of TOGAF – the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Open Agile Architecture
Open Agile Architecture (O-AA) is a brand new standard published by The Open Group in the second half of 2020. It contains a lot of useful techniques for agile and digital transformation of the architecture of the ...
Wireless transmission networks - from 0G to 5G
The aim of this course is to deepen the knowledge of graduates familiar with the functions of the 5G system. students will get acquainted with more detailed information about the construction of their own core, radio ...
Wireless transmission networks - from 0G to 5G
The aim of this course is to acquaint participants with the new generation of mobile 5G. Students will learn new features in the 5 G system such as a complete new radio part, new network core and new 5 G services.
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Practical Introduction to EA and ITSM
Modern approaches to the strategic planning of organization ICT architecture and the ICT service operations served in the introductory course. We will introduce basic methodologies and frameworks for managing ICT ...
Power Platform Fundamentals
Learn the business value and product capabilities of Microsoft Power Platform. Create simple Power Apps, connect data with Dataverse, build a Power BI Dashboard, automate processes with Power Automate, and build a ...
Malware analysis
This one-day course covers basic techniques, tools and approaches used for identification and analysis of different types of malicious code and discovery of its main functions. It teaches the skills necessary for ...
MS365-Overview of accounts and possibility of integration
Five days of instructor-led training preparing students for MS-100 certification exam. At course completion students will be able: Office 365 overview Moving your organization to Office 365 Configuring Office ...
Microsoft 365 - Expert: Enterprise Administrator 2
Four days of instructor-led training preparing students for MS-101 certification exam..
Microsoft 365 - Associate: Security Administrator
Four days of instructor-led training preparing students for MS-500 certification exam..