Introduction to Cybersecurity 2.1 - course RUB 10,990. from Specialist, training, Date: December 1, 2023.
Miscellaneous / / December 04, 2023
Practical teacher, certified specialist in routing and switching in Cisco networks. Cisco Systems Certified Instructor and Cisco Networking Academy Certified Instructor.
Since 2011, he has been teaching courses on switching and routing in various networks and preparing students for exams for international Cisco certifications. By taking courses under his guidance, you will gain practical skills in working with corporate networks and Internet service provider networks, learn how to configure Cisco switches and routers, identify problems and malfunctions in networks, implement network protocols and use Ethernet, Etherchannel, VLAN, ACL technologies, VPN, etc. During classes, Pavel Sergeevich gives examples of problems that he had to encounter in his own practice, willingly and answers questions from listeners in an interesting way, finds an individual approach to listeners and explains information to everyone in an accessible way.
Pavel Sergeevich graduated from Moscow State University for the Humanities named after M.A. Sholokhov with a degree in Mathematics Teacher. Worked as a service engineer, consultant on installation and administration of structured cable networks, administered servers based on FreeBSD/Linux, Windows Server, VMware vSphere. Since September 2017, he has been working in a large Russian group of companies as a Leading Network Architecture Engineer. Pavel Sergeevich has extensive experience in installing, configuring and administering all types of networks, network and server equipment.
Turn your Android smartphone into a real fighting machine. Learn to hide your identity, attack and defend yourself using your Android smartphone. The course is full of practice and instructions on how to monetize the acquired skills.
2,9
The course provides detailed materials on the operation of computer systems and networks. Typical vulnerabilities of network protocols, operating systems and applications are considered. The sequences of various types of attacks on computer systems and networks are described, and recommendations for strengthening the security of computer systems and networks are proposed.
4,2