Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

755 Results Found for "course"

Results per page: 10 40 80

A Guide to Concept Training Methodology

Article | Feb. 19, 2018

When Global Knowledge and ctc TrainCanada joined forces in August 2017, Global Knowledge added Concept Training, an innovative and industry-leading training methodology, to course deliveries. Going forward, when you take a Microsoft Office course with us, you’ll get to experience our Concept Training methodology. But what does that really mean?

DASA DevOps Professional: Enable and Scale Certification

Certification

The DASA DevOps Professional: Enable and Scale certification is designed to provide the core education necessary to put DevOps into practice.

Architecting on AWS

Related Page

Nutanix Certified Professional - Multi Cloud Infrastructure (NCP-MCI)

Certification

Get the Nutanix Certified Professional (NCP) Certification

The Basics of Configuring and Using Cisco Network Address Translation

White Paper | July 31, 2014

There are few (if any) networks in the world that do not implement NAT/PAT for IP version 4. IP version 6 will eliminate a lot of the need for NAT. Even though NAT is usually implemented as a firewalling function, it can be important on Cisco routers as well. From this, it is simple to conclude that understanding, designing, implementing, and troubleshooting NAT is a required skill for network engineers. The topic also appears in the CCNA examination in multiple questions and simulations.

“nat-control” versus “no nat-control”

Article | Nov. 24, 2009

ASA and PIX software version 7.0 introduced the configuration command nat-control which didn’t exist in previous versions of code. Although training course material for both the SNAF (Securing Networks with ASA Fundamentals) and SNAA (Securing Networks with ASA Advan...

ASA Service Policies with Priority and Policing

Article | Nov. 03, 2010

As is sometimes the case, the idea for this article originated with a student question I received during one of the Securing Networks with ASA Fundamentals classes I have taught this summer. The course material mentions a simple scenario whereby IP Telephony traffic...