-
All
-
Online
-
Filters
-
Location
-
Online
-
Type of studies
-
+ Filters (1)
Classroom-based Hardware, Networks and Security Training
- Training
- Ilford
- 12 Days
...Understanding Cisco IOS commands for configuring and. managing Cisco networking devices. Understanding Cisco configuration techniques. Understanding routing protocols. IP addressing. Wireless Connectivity, and so on&&. Suitable for: CCNA training is suitable for those who are interested to...
- Training
- Londonandanother venue.
- Bath
- 1 Day
...After completing this clinic, students will be able to understand how to implement perimeter defenses; use ISA Server to protect the network perimeter; implement client defenses; use Internet Connection Firewall (ICF) to protect clients; protect wireless networks; protect networks by using...
- Training
- Chennai (India)
- Intermediate
- Different dates available
...CCNA is the most on-demand IT certification in the hardware and networking field globally. CCNA (Cisco Certified Network Associate) is the entry-level certification to exhibit a professional skill to understand, install, configure, operate and troubleshoot routed and switched networks... Learn about: Network Training...
- Training
- London
... Services Communications and Security Monitoring, Backups, and Recovery Configuring 2008 Network Infrastructure 70-642 Configure IP Addressing and Windows...
- Training
- London
- Beginner
- 3 Days
... Implementation of an information security risk management program Understanding an organization and its context Risk identification and risk analysis... Learn about: ISO 27005, Information Security, ISO Audit...
- Training
- Riyadh (Saudi Arabia)
- Advanced
- Different dates available
... global opportunities with COBIT 5 Assessor certification - Enhance your IT Security and Governance career with a globally-accredited and recognized COBIT... Learn about: IT Security, IT Management...
- Training
- Guayaquil (Ecuador)
- Intermediate
- 2 Days
...El taller de Televisión Digital es de naturaleza teorica práctica y propone desarrollar en los estudiantes competencias para el análisis y comprensión... Learn about: Televisión digital, Internet Protocol...
- Training
- Londonand3 other venues
- Wokingham, Wakefield, Coventry
...On this 5-day course delegates will gain the knowledge and skills needed to configure, maintain, and operate Cisco ASA 5500 Series Adaptive Security...
- Training
- London
- Intermediate
- 5 Days
...#text-block-10 { margin-bottom:0px; text-align:left; } Core Modules 1. Need for Security Analysis 2. TCP IP Packet Analysis 3. Penetration Testing... Learn about: Java security, Network security, Embedded security...
- Training
- Amsterdam (Netherlands)
- Advanced
- 10 Jun 2024
...This 5-day CISSP certification training will prepare you for the official (ISC)2 CISSP exam. Get certified now for CISSP, the world’s premier (cyber) security certification!... Learn about: Security and Risk Management, Security Awareness, Security Professionals...
- Training
- Ilford
- 32 Days
...ROUTE 642 902 exam: OSPF. -EIGRP. -Integrated IS-IS. -Cisco® IOS routing features. -BGP for enterprise ISP connectivity. -IP Multicast. -IPv6. SWITCH 642 813 exam: VLANs. -Spanning Tree Protocol (STP). -Inter-VLAN routing. -Wireless. -Security. -Voice. TSHOOT 642 832 exam: Plan and perform regular...
- Training
- Londonandanother venue.
- Bath
- 1 Day
... software (malware) for client computers, servers, and the network infrastructure; describe. Suitable for: This course builds on existing knowledge of server and client security and provides students with the knowledge and skills to apply security best practices for Microsoft Exchange Server and to...
- Training
- Chennai (India)
- Intermediate
- Different dates available
... the infrastructure of corporates from various data breaches. In our training, you can learn step by step basics methodologies like how to write virus codes that the hackers use, reverse engineering and more in-depth. Candidates can develop their skills in network security by learning different concepts like advanced... Learn about: Network Training...
- Training
- Norwich
- 3 Days
... and groups, files and folders, printers and backups. Suitable for: Delegates must have a good working knowledge of Windows and be competent in managing files and folders. In addition, delegates must be familiar with basic computer hardware and networking concepts...
- Training
- London
- Beginner
- 5 Days
...ISO 27001:2013 Lead Auditor Training PECB Who should attend The PECB ISO/IEC 27001@2013 Training is aimed for individuals that wish to conduct external... Learn about: ISO requirements, Security Management, Security Awareness...
- Training
- Abu Dhabi (United Arab Emirates)
- Advanced
- Different dates available
...://www.invensislearning.com/it-security-governance/cobit-5-foundation-certification-training-abu-dhabi-united-arab-emirates/cobit94invl30212/ Benefits of our COBIT 5 Foundation... Learn about: IT Management, IT Security...
- Training
- Wembley
- Advanced
- Different dates available
...Cisco Certified Network Associate (CCNA) V3 (NEW SYLLABUS ) validates the ability to install, configure, operate, and troubleshoot medium size route and switched networks, including implementation and verification of connections to remote sites in a... Learn about: Cisco certifications, Cisco networking, Cisco IOS...
- Training
- Londonand2 other venues
- Wokingham, Wakefield
...This lab-intensive 5-day course is aimed at providing network specialists with the knowledge and skills needed to secure Cisco IOS router and switch networks...
- Training
- London
- Intermediate
- 5 Days
... CHFI Certification Program. Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery. The tools and techniques covered... Learn about: IT Security, Computer Hacking, Forensic Investigator...
- Training
- Utrecht (Netherlands)
- Advanced
- 02 Oct 2024
... compromising security or exposing sensitive information. Security and Identity Management & Access Control leaders often struggle with launching and sustaining Identity Management & Access Control initiatives. International Management Forum (IMF) advocates an approach to govern Identity Management & Access... Learn about: IT Security, IT risk, Access Control...