Course Code: 860025
The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting training that introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious,...
Course Code: 834084
Course Code: 860043
The Enhancing Cisco Security Solutions with Data Analytics (ECSS) training covers intermediate-level knowledge of Splunk, including its fundamentals, key components, and architecture so you can detect, investigate, and respond to security threats effectively. You’ll...
Course Code: 2481
Get guidance on Kanban implementation and bootstrapping a Kanban system in your own organization.
Course Code: 9719
This course provides a basic understanding of full-spectrum cyberspace operations; the complexities of the cyberspace environment; and planning, organizing, and integrating cyber ops. The course consists of presentations and exercises that teach students how to desig...
Course Code: 9047
This course is designed to teach you how to use the Hardware Configuration Definition (HCD) of z/OS to create an I/O configuration and dynamically alter the I/O configuration.
Course Code: 9043
This course is designed to teach you the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and BookManager.
Course Code: 0832
This course is designed to give the z/OS Operator personnel as well as entry systems programmers an overview about JES2. The students should be able to use JES2 commands at the z/OS Console and use SDSF.
Course Code: 0837
This course is developed for systems programmers working on an implementation of a Parallel Sysplex. It covers the details of z/OS and z/OS-related products and subsystems exploiting the Parallel Sysplex components. It is focused on the resource sharing side.
Course Code: 5827
Learn to analyze, exploit packet captures, and put the rule writing theories learned to work by implementing rule-language features for triggering alerts on the offending network traffic.