top of page

Résultats de recherche

Résultats trouvés pour «  »

  • Services et Conseils Informatiques à Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha - SITA IT Solutions

    25 ans D'EXPÉRIENCE Un savoir faire unique, mis à votre service Voir plus Solutions & Conseils IT Soucieuse de votre réussite, SITA IT Solutions vous propose un accompagnement sur mesure afin de mener au mieux vos projets. En mettant à profit notre expérience et notre réseau d'experts, notre mission est de vous donner toutes les cartes en main pour atteindre vos objectifs. Une intervention possible à tous les stades de votre projet, tant d'un point de vue pédagogique, que sur le terrain au travers de missions de Conseil, Expertise, Audit, Formation ou encore de Communication. Avant-Vente Un accompagnement à plusieurs niveaux : - Assistance à maîtrise d'ouvrage SI - Architecture - Design - Veille technologique - Rédaction de cahiers des charges Services Des services assurés par notre pool de consultants experts dans des domaines tels que : - Audit - Workshop - POC (Proof Of Concept) - Aide à l'intégration - Transfert de compétences Communication Accompagnement dans vos démarches de communication au travers de : - Organisation d'events IT - Animation technique et/ou commerciale - Campagne de communication auprès de son réseau RH as A Service #RHaAS L'humain étant au coeur de nos activités , trouvons ensemble les compétences dont vous avez besoin : - Recherche de consultants - Mise à disposition de profils pour missions - Recrutement - Assistance technique La satisfaction client, notre priorité

  • Cisco DCCOR | Sita IT Solutions | Dubai, UEA, Middle East

    Implementing and Operating Cisco Data Center Core Technologies DCCOR Duration 5 days Public Price On demand Place Show all places Dates Show all dates Who should attend Prerequisite Objectives Outline Course Overview The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) course helps you prepare for the Cisco® CCNP® Data Center and CCIE® Data Center certifications for advanced-level data center roles. In this course, you will master the skills and technologies you need to implement data center compute, LAN and SAN infrastructure. You will also learn the essentials of automation and security in data centers. You will gain hands-on experience deploying, securing, operating, and maintaining Cisco data center infrastructure including: Cisco MDS Switches and Cisco Nexus Switches; Cisco Unified Computing System™ (Cisco UCS®) B-Series Blade Servers, and Cisco UCS C-Series Rack Servers. This course has 5 ILT days with 3 additional self-study days (3 days of content to be covered by the student in their own time). This course, including the self-paced material, helps prepare you to take the exam: 350-601 Implementing Cisco Data Center Core Technologies (DCCOR) Who should attend Network designers Network administrators Network engineers Systems engineers Data center engineers Consulting systems engineers Technical solutions architects Field engineers Cisco integrators and partners Server administrator Network manager Prerequisite To fully benefit from this course, you should have the following knowledge and skills: Familiarity with Ethernet and TCP/IP networking Familiarity with SANs Familiarity with Fibre Channel protocol Identify products in the Cisco Data Center Nexus and Cisco MDS families Understanding of Cisco Enterprise Data Center architecture Understanding of server system design and architecture Familiarity with hypervisor technologies (such as VMware) These Cisco courses are recommended to help you meet these prerequisites: Implementing and Administering Cisco Solutions (CCNA) Understanding Cisco Data Center Foundations (DCFNDU) Objectives After taking this course, you should be able to: Implement routing and switching protocols in Data Center environment Implement overlay networks in data center Introduce high-level Cisco Application Centric Infrastructure (Cisco ACI™) concepts and Cisco Virtual Machine manager (VMM) domain integration Describe Cisco Cloud Service and deployment models Implement Fibre Channel fabric Implement Fibre Channel over Ethernet (FCoE) unified fabric Implement security features in data center Implement software management and infrastructure monitoring Implement Cisco UCS Fabric Interconnect and Server abstraction Implement SAN connectivity for Cisco Unified Computing System™ (Cisco UCS®) Describe Cisco HyperFlex™ infrastructure concepts and benefits Implement Cisco automation and scripting tools in data center Evaluate automation and orchestration technologies Outline Implementing Data Center Switching Protocols* Spanning Tree Protocol Port Channels Overview Implementing First-Hop Redundancy Protocols* Hot Standby Router Protocol (HSRP) Overview Virtual Router Redundancy Protocol (VRRP) Overview Implementing Routing in Data Center* Open Shortest Path First (OSPF) v2 and Open Settlement Protocol (OSP) v3 Border Gateway Protocol Implementing Multicast in Data Center* IP Multicast in Data Center Networks Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Implementing Data Center Overlay Protocols Cisco Overlay Transport Virtualization Virtual Extensible LAN Implementing Network Infrastructure Security* User Accounts and Role Based Access Control (RBAC) Authentication, Authorization, and Accounting (AAA) and SSH on Cisco NX-OS Describing Cisco Application-Centric Infrastructure Cisco ACI Overview, Initialization, and Discovery Cisco ACI Management Describing Cisco ACI Building Blocks and VMM Domain Integration Tenant-Based Components Cisco ACI Endpoints and Endpoint Groups (EPG) Describing Packet Flow in Data Center Network* Data Center Traffic Flows Packet Flow in Cisco Nexus Switches Describing Cisco Cloud Service and Deployment Models Cloud Architectures Cloud Deployment Models Describing Data Center Network Infrastructure Management, Maintenance, and Operations* Time Synchronization Network Configuration Management Explaining Cisco Network Assurance Concepts* Need for Network Assurance Cisco Streaming Telemetry Overview Implementing Fibre Channel Fabric Fibre Channel Basics Virtual Storage Area Network (VSAN) Overview Implementing Storage Infrastructure Services Distributed Device Aliases Zoning Implementing FCoE Unified Fabric Fibre Channel over Ethernet Describing FCoE Implementing Storage Infrastructure Security* User Accounts and RBAC Authentication, Authorization, and Accounting Describing Data Center Storage Infrastructure Maintenance and Operations* Time Synchronization Software Installation and Upgrade Describing Cisco UCS Server Form Factors* Cisco UCS B-Series Blade Servers Cisco UCS C-Series Rack Servers Implementing Cisco Unified Computing Network Connectivity Cisco UCS Fabric Interconnect Cisco UCS B-Series Connectivity Implementing Cisco Unified Computing Server Abstraction Identity Abstraction Service Profile Templates Implementing Cisco Unified Computing SAN Connectivity iSCSI Overview Fibre Channel Overview Implementing Unified Computing Security User Accounts and RBAC Options for Authentication Introducing Cisco HyperFlex Systems* Hyper converged and Integrated Systems Overview Cisco HyperFlex Solution Describing Data Center Unified Computing Management, Maintenance, and Operations* Compute Configuration Management Software Updates Implementing Cisco Data Center Automation and Scripting Tools* Cisco NX-OS Programmability Scheduler Overview Describing Cisco Integration with Automation and Orchestration Software Platforms Cisco and Ansible Integration Overview Cisco and Puppet Integration Overview Describing Cisco Data Center Automation and Orchestration Technologies* Power On Auto Provisioning Cisco Data Center Network Manager Overview * This section is self-study material that can be done at your own pace after the instructor-led portion of the course. Lab outline Configure Virtual Extensible LAN (VXLAN) Explore the Cisco ACI Fabric Implement Cisco ACI Access Policies and Out-of-Band Management Implement Cisco ACI Tenant Policies Integrate Cisco ACI with VMware Configure Fibre Channel Configure Device Aliases Configure Zoning Configure NPV Provision Cisco UCS Fabric Interconnect Cluster Configure Server and Uplink Ports Configure VLANs Configure a Cisco UCS Server Profile Using Hardware Identities Configure Basic Identity Pools Configure a Cisco UCS Service Profile Using Pools Configure an Internet Small Computer Systems Interface (iSCSI) Service Profile Configure Cisco UCS Manager to Authenticate Users with Microsoft Active Directory Configure Cisco Nexus Switches with Ansible Program a Cisco Nexus Switch with Python Automate Cisco Application-Centric Infrastructure Configuration Dates and Booking UAE, Dubai Jan 9-13, 2023 Apr 3-7, 2023 Jul 3-7, 2023 Oct 2-6, 2023 Egypt, Cairo On demand Kuwait, Kuwait City On demand Oman, Muscat On demand Qatar, Doha Jan 9-13, 2023 Jul 3-7, 2023 Saudi Arabia, Riyadh Apr 3-7, 2023 Oct 2-6, 2023 Booking prerequis contenu Objectifs public Dates

  • Formation Cybersécurité à Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha - SITA IT Solutions

    Formations cybersécurité et sécurité informatique SITA IT Solutions propose une large gamme de formations en cybersécurité et sécurité informatique pour répondre aux besoins croissants des entreprises confrontées au développement des risques et menaces informatiques. Notre offre de formation dans les domaines de la sécurité informatique et de la cybersécurité s'adresse aux salariés, juristes, ingénieurs informaticiens, responsables de la sécurité des systèmes d'information (ISSM), responsables informatiques et chefs d'entreprise. Son objectif est de former tous les acteurs de l'entreprise à la mise à jour et à l'acquisition des compétences nécessaires pour lutter de manière coordonnée contre les nouveaux risques de sécurité informatique. Face à la demande croissante de formation dans ce domaine, SITA IT Solutions s'est entourée d'experts en sécurité, de consultants, de cabinets de conseil spécialisés, ou de partenaires en formation professionnelle et continue en cybersécurité et sécurité informatique pour répondre aux enjeux de la sécurité des systèmes informatiques et réseaux, sécurité de l'information et gestion des données personnelles. Aujourd'hui, les cybermenaces prennent diverses formes et impactent tous les domaines d'activité des entreprises. La lutte contre les risques cyber nécessite donc un large éventail de compétences afin d'anticiper et de répondre efficacement à l'explosion des menaces. L'ensemble des formations cybersécurité & sécurité informatique couvrent les domaines suivants : Cybersécurité | Sécurité juridique | Sécurité Organisationnelle | Sécurité Technique | Continuité d'Activité nos formations "best-seller" EBIOS2018 RISK MANAGER COBIT 2019 FOUNDATION Cybersécurité des Systèmes Industriels Droits de la cybersécurité Toutes nos formations en CYBERSÉCURITÉ ET SÉCURITÉ INFORMATIQUE Cybersécurité CompTIA Security+ - 5 jours ELASTICSEARCH - 5 jours ESSCYBER - Cybersecurity Technical Essentials - 2 jours SPLUNK - 3 jours SELINUX - Understand SELinux and know how to modify the security policy - 2 jours Sécurité Juridique ISO 27701 - PIMS - 5 jours PIA - ISO 29134 - 3 jours Sécurité Organisationnelle CCSP - Certified Cloud Security Professional - 5 jours CISA - CISA Preparation - 5 jours CISSP - Certified Information Systems Security Professional - 5 jours EBIOS 2010 - Risk Manager - 3 jours EBIOS 2018 - Risk Manager - 3 jours ISO27LA - ISO 27001 - Lead Auditor - 5 jours ISO27LI - ISO 27001- Lead Implementer - 5 jours ISO27RM - ISO 27005 Risk Manager - 3 jours ISO27004 - Cybersecurity indicators and dashboards - 1 jours ISO27035 - Security incident management - 1 jours RSSI - Become an Information Systems Security Manager - 5 jours Sécurité Technique ALGOSEC Firewall Analyzer and FireFlow Training - CASA - 3 jours INFOBLOX Lead SCADA Security Manager - PECB Certified - 5 jours Continuité d'Activité ISO 22301 Lead Auditor - 5 jours ISO 22301 Lead Implementer - 5 jours RPCA- Business Continuity Plan Manager - 5 jours Cybersecurity Legal security Sécurité technique Sécurité organisationnelle Continuité d'activité

  • Cisco ENCOR | Sita IT Solutions | Dubai, UEA, Middle East

    Implementing and Operating Cisco Enterprise Network Core Technologies ENCOR Duration 5 days Public Price On demand Place Show all places Dates Show all dates Who should attend Prerequisites Objectives Outline Course Overview The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles within an enterprise network and how to overlay network design by using solutions such as SD-Access and SD-WAN. This course has 5 days with 3 additional self-study days (3 days of content to be covered by the student in their own time). This course helps you prepare to take the 350-401 Implementing Cisco® Enterprise Network Core Technologies (ENCOR) exam, which is part of four new certifications: CCNP® Enterprise CCIE® Enterprise Infrastructure CCIE Enterprise Wireless Cisco Certified Specialist – Enterprise Core This course will help you: Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Earn 64 Continuing Education credits toward recertification Who should attend Mid-level network engineers Network administrators Network support technicians Help desk technicians Prerequisites Knowledge and skills you should have before attending this course: Implementation of Enterprise LAN networks Basic understanding of Enterprise routing and wireless connectivity Basic understanding of Python scripting Objectives After taking this course, you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts Troubleshoot Layer 2 connectivity using VLANs and trunking Implementation of redundant switched networks using Spanning Tree Protocol Troubleshooting link aggregation using Etherchannel Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP) Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6 Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT) Describe the virtualization technology of servers, switches, and the various network devices and components Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP) Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture Describe wireless roaming and location services Describe how APs communicate with WLCs to obtain software, configurations, and centralized management Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-Shared Key (PSK) wireless client authentication on a WLC Troubleshoot wireless client connectivity issues using various available tools Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network Explain basic Python components and conditionals with script writing and analysis Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF Describe APIs in Cisco DNA Center and vManage Outline Examining Cisco Enterprise Network Architecture Understanding Cisco Switching Paths Implementing Campus LAN Connectivity Building Redundant Switched Topology Implementing Layer 2 Port Aggregation Understanding EIGRP Implementing OSPF Optimizing OSPF Exploring EBGP Implementing Network Redundancy Implementing NAT Introducing Virtualization Protocols and Techniques Understanding Virtual Private Networks and Interfaces Understanding Wireless Principles Examining Wireless Deployment Options Understanding Wireless Roaming and Location Services Examining Wireless AP Operation Understanding Wireless Client Authentication Troubleshooting Wireless Client Connectivity Introducing Multicast Protocols Introducing QoS Implementing Network Services Using Network Analysis Tools Implementing Infrastructure Security Implementing Secure Access Control Understanding Enterprise Network Security Architecture Exploring Automation and Assurance Using Cisco DNA Center Examining the Cisco SD-Access Solution Understanding the Working Principles of the Cisco SD-WAN Solution Understanding the Basics of Python Programming Introducing Network Programmability Protocols Introducing APIs in Cisco DNA Center and vManage Lab outline Investigate the CAM Analyze Cisco Express Forwarding Troubleshoot VLAN and Trunk Issues Tuning Spanning Tree Protocol (STP) and Configuring Rapid Spanning Tree Protocol (RSTP) Configure Multiple Spanning Tree Protocol Troubleshoot EtherChannel Implement Multi-area OSPF Implement OSPF Tuning Apply OSPF Optimization Implement OSPFv3 Configure and Verify Single-Homed EBGP Implementing Hot Standby Routing Protocol (HSRP) Configure Virtual Router Redundancy Protocol (VRRP) Implement NAT Configure and Verify Virtual Routing and Forwarding (VRF) Configure and Verify a Generic Routing Encapsulation (GRE) Tunnel Configure Static Virtual Tunnel Interface (VTI) Point-to-Point Tunnels Configure Wireless Client Authentication in a Centralized Deployment Troubleshoot Wireless Client Connectivity Issues Configure Syslog Configure and Verify Flexible NetFlow Configuring Cisco IOS Embedded Event Manager (EEM) Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug Configure and Verify Cisco IP SLAs Configure Standard and Extended ACLs Configure Control Plane Policing Implement Local and Server-Based AAA Writing and Troubleshooting Python Scripts Explore JavaScript Object Notation (JSON) Objects and Scripts in Python Use NETCONF Via SSH Use RESTCONF with Cisco IOS XE Software Dates and Booking UAE, Dubai Jan 23-27, 2023 Mar 20-24, 2023 May 22-26, 2023 Jul 24-28, 2023 Sep 18-22, 2023 Nov 20-24, 2023 Egypt, Cairo Dec 4-8, 2022 Kuwait, Kuwait City Mar 20-24, 2023 Oman, Muscat Nov 20-24, 2023 Qatar, Doha Mar 20-24, 2023 Jul 24-28, 2023 Nov 20-24, 2023 Saudi Arabia, Riyadh Jan 23-27, 2023 May 22-26, 2023 Sep 18-22, 2023 Booking prerequis contenu Objectifs Dates public

  • SITA IT Solutions - Formations et Solutions IT à Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha

    FORMATIONS & SOLUTIONS IT FORMATIONS IT Un large éventail de formations IT officielles en présentiel , à distance ou en e-learning . Des offres 100% personnalisables selon vos besoins (formation sur mesure, intra ou inter-entreprises). Voir plus SOLUTIONS IT Un accompagnement sur mesure tout au long de vos projets. Nous mettons à disposition notre savoir-faire et l'expertise de nos consultants afin d'intervenir en termes d'avant-vente , de conseils IT ou encore de communication . Voir plus RH AS A SERVICE #RHaAS Spécialistes du recrutement de talents dans les métiers de l'informatique, nous intervenons sur le Moyen Orient et à l'international afin d'identifier les talents et de favoriser le meilleur matching entre candidats et entreprises. Voir plus “ Notre mission est de contribuer à faire de vos projets des succès, en apportant les compétences et les ressources humaines dont vous avez besoin. " Sandra Bocciolini, Co-Founder & Directrice Marketing & Commerciale Une intervention étendue sur l'ensemble du Moyen Orient... mais pas seulement ! Nous répondons également à vos besoins sur les zones Francophones - Europe - Afrique Emirats Arabes Unis Arabie Saoudite Koweit Qatar Événements CABSAT - Dubai World Trade Centre L'événement se tiendra du 17 au 19 mai 2022 au Dubai World Trade Centre. French Tuesday - Dubaï CCI FRANCE UAE a organisé le 11 janvier 2022 le French Tuesday. Expo 2020 DUBAI UAE L'expo Dubai 2020 se déroule du 1er octobre 2021 au 31 mars 2022.

  • Cisco SCOR | Sita IT Solutions | Dubai, UEA, Middle East

    Implementing and Operating Cisco Security Core Technologies SCOR Duration 5 days Public Price On demand Place Show all places Dates Show all dates Who should attend Prerequisite Objectives Outline Course Overview The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Who should attend Security Engineer Network Engineer Network Designer Network Administrator Systems Engineer Consulting Systems Engineer Technical Solutions Architect Cisco Integrators/Partners Network Manager Cisco integrators and partners Prerequisite To fully benefit from this course, you should have the following knowledge and skills: Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course Familiarity with Ethernet and TCP/IP networking Working knowledge of the Windows operating system Working knowledge of Cisco IOS networking and concepts Familiarity with basics of networking security concepts Objectives After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication Provide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment This course will help you: Gain hands-on experience implementing core security technologies and learn best practices using Cisco security solutions Prepare for the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam Qualify for professional and expert-level security job roles This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. This exam tests a candidate's knowledge of implementing and operating core security technologies. Outline Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications Configuring 802.1X Authentication Cisco Catalyst® Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Spanning Tree Protocol (STP) Attacks Mitigation Deploying Layer 3 Data Plane Security Controls* Infrastructure Antispoofing ACLs Unicast Reverse Path Forwarding IP Source Guard Deploying Management Plane Security Controls* Cisco Secure Management Access Simple Network Management Protocol Version 3 Secure Access to Cisco Devices Deploying Traffic Telemetry Methods* Network Time Protocol Device and Network Events Logging and Export Network Traffic Monitoring Using NetFlow Deploying Cisco Stealthwatch Enterprise* Cisco Stealthwatch Offerings Overview Cisco Stealthwatch Enterprise Required Components Flow Stitching and Deduplication Describing Cloud and Common Cloud Attacks* Evolution of Cloud Computing Cloud Service Models Security Responsibilities in Cloud Securing the Cloud* Cisco Threat-Centric Approach to Network Security Cloud Physical Environment Security Application and Workload Security Deploying Cisco Stealthwatch Cloud* Cisco Stealthwatch Cloud for Public Cloud Monitoring Cisco Stealthwatch Cloud for Private Network Monitoring Cisco Stealthwatch Cloud Operations Describing Software-Defined Networking (SDN*) Software-Defined Networking Concepts Network Programmability and Automation Cisco Platforms and APIs * This section is self-study material that can be done at your own pace after the instructor-led portion of the course. Lab outline Configure Network Settings and NAT on Cisco ASA Configure Cisco ASA Access Control Policies Configure Cisco Firepower NGFW NAT Configure Cisco Firepower NGFW Access Control Policy Configure Cisco Firepower NGFW Discovery and IPS Policy Configure Cisco NGFW Malware and File Policy Configure Listener, Host Access Table (HAT), and Recipient Access Table (RAT) on Cisco Email Security Appliance (ESA) Configure Mail Policies Configure Proxy Services, Authentication, and HTTPS Decryption Enforce Acceptable Use Control and Malware Protection Examine the Umbrella Dashboard Examine Cisco Umbrella Investigate Explore DNS Ransomware Protection by Cisco Umbrella Configure Static VTI Point-to-Point IPsec IKEv2 Tunnel Configure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW Configure Remote Access VPN on the Cisco Firepower NGFW Explore Cisco AMP for Endpoints Perform Endpoint Analysis Using AMP for Endpoints Console Explore File Ransomware Protection by Cisco AMP for Endpoints Console Explore Cisco Stealthwatch Enterprise v6.9.3 Explore Cognitive Threat Analytics (CTA) in Stealthwatch Enterprise v7.0 Explore the Cisco Cloudlock Dashboard and User Security Explore Cisco Cloudlock Application and Data Security Explore Cisco Stealthwatch Cloud Explore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors Dates and Booking UAE, Dubai Feb 6-10, 2023 Apr 3-7, 2023 Jun 5-9, 2023 Aug 7-11, 2023 Oct 9-13, 2023 Dec 4-8, 2023 Egypt, Cairo On demand Kuwait, Kuwait City On demand Oman, Muscat On demand Qatar, Doha Feb 6-10, 2023 Jun 5-9, 2023 Oct 9-13, 2023 Saudi Arabia, Riyadh Apr 3-7, 2023 Aug 7-11, 2023 Dec 4-8, 2023 Booking prerequis contenu Objectifs public Dates

  • Cisco ENARSI | Sita IT Solutions | Dubai, UEA, Middle East

    Implementing Cisco Enterprise Advanced Routing and Services ENARSI Duration 5 days Public Price On demand Place Show all places Dates Show all dates Who should attend Prerequisites Objectives Outline Course Overview The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) course. This course helps prepare you to take the exam, Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI), which leads to the new CCNP® Enterprise and Cisco Certified Specialist – Enterprise Advanced Infrastructure Implementation certifications. Who should attend Enterprise network engineers System engineers System administrators Network administrators Prerequisites Before taking this course, you should have: General understanding of network fundamentals Basic knowledge of how to implement LANs General understanding of how to manage network devices General understanding of how to secure network devices Basic knowledge of network automation These Cisco courses are recommended to help you meet these prerequisites: Implementing and Administering Cisco Solutions (CCNA) Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) Objectives After taking this course, you should be able to: Configure classic EIGRP and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure OSPFv2 and OSPFv3 in IPv4 and IPv6 environments Optimize OSPFv2 and OSPFv3 behavior Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using PBR and IP SLA Configure MP-BGP in IPv4 and IPv6 environments Optimize MP-BGP in IPv4 and IPv6 environments Troubleshoot MP-BGP for IPv4 and IPv6 Describe the features of MPLS Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco IOS DMVPNs Implement DHCP Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services This course will help you: Gain the knowledge you need to install, configure, operate, and troubleshoot an enterprise network Qualify for professional-level job roles in advance routing and services Prepare for the Implementing Cisco Enterprise Advanced Routing and Services (300-410 ENARSI) exam Outline Implementing EIGRP Optimizing EIGRP Troubleshooting EIGRP Implementing OSPF Optimizing OSPF Troubleshooting OSPF Configuring Redistribution Troubleshooting Redistribution Implementing Path Control Implementing Internal Border Gateway Protocol (IBGP) Optimizing BGP Implementing MP-BGP Troubleshooting BGP Exploring MPLS Introducing MPLS L3 VPN Architecture Introducing MPLS L3 VPN Routing Configuring Virtual Routing and Forwarding (VRF)-Lite Implementing DMVPN Implementing DHCP Introducing IPv6 First Hop Security Securing Cisco Routers Troubleshooting Infrastructure Security and Services Troubleshooting with DNA Center Assurance Lab outline Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6 Verify the EIGRP Topology Table Configure EIGRP Stub Routing, Summarization, and Default Routing Configure EIGRP Load Balancing and Authentication Troubleshoot EIGRP Issues Configure OSPFv3 for IPv4 and IPv6 Verify the Link-State Database Configure OSPF Stub Areas and Summarization Configure OSPF Authentication Troubleshoot OSPF Issues Implement Routing Protocol Redistribution Manipulate Redistribution Manipulate Redistribution Using Route Maps Troubleshoot Redistribution Issues Implement PBR Configure IBGP and External Border Gateway Protocol (EBGP) Implement BGP Path Selection Configure BGP Advanced Features Configure BGP Route Reflectors Configure MP-BGP for IPv4 and IPv6 Troubleshoot BGP Issues Configure Routing with VRF-Lite Implement Cisco IOS DMVPN Obtain IPv6 Addresses Dynamically Troubleshoot DHCPv4 and DHCPv6 Issues Troubleshoot IPv4 and IPv6 Access Control List (ACL) Issues Configure and Verify Unicast Reverse Path Forwarding (uRPF) Troubleshoot Network Management Protocol Issues: Lab 1 Troubleshoot Network Management Protocol Issues: Lab 2 Dates and Booking UAE, Dubai Jan 9-13 , 2023 Fev 27-Mar 3, 2023 May 1-5, 2023 Jul 3-7, 2023 Aug 28-Sep 1, 2023 Oct 30-Nov 3, 2023 Egypt, Cairo Dec 4-8, 2022 Kuwait, Kuwait City Aug 28-Sep 1, 2023 Oman, Muscat Fev 27-Mar 3, 2023 Qatar, Doha Fev 27-Mar 3, 2023 Jul 3-7, 2023 Oct 30-Nov 3, 2023 Saudi Arabia, Riyadh Jan 9-13, 2023 May 1-5, 2023 Aug 28-Sep 1, 2023 Booking prerequis contenu Objectifs public Dates

  • Formation Cloud Computing à Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha - SITA IT Solutions

    FORMATIOns CLOUD COMPUTING Le cloud computing s'est imposé ces dernières années dans les entreprises de tous secteurs et de toutes tailles. Décliné sous différentes formes : privé, public ou hybride, le cloud computing favorise la transformation numérique des entreprises à plusieurs niveaux : applications métiers, infrastructures informatiques et nouveaux usages. Flexible, évolutif et accessible, le cloud computing est aussi un levier de performance supplémentaire pour les DSI et les entreprises. L'enjeu est désormais de maîtriser cette technologie, ses évolutions et les usages associés pour en tirer le meilleur parti, tant en termes d'innovation que de performance. Pour s'approprier pleinement le cloud computing et bénéficier de ses avantages, les équipes informatiques doivent pouvoir développer leurs compétences sur le sujet et mesurer son impact sur l'organisation des infrastructures : virtualisation des réseaux, architectures orientées services, sécurité, évolutivité et coûts maîtrisés. Que la technologie cloud soit déjà présente dans votre entreprise ou que vous envisagiez une migration prochainement, vos équipes informatiques (administrateurs réseaux, développeurs, DSI, RSSI, etc.) doivent pouvoir se familiariser avec les plateformes cloud existantes afin de maîtriser leur installation, leur sécurité et le développement d'applications et de services. SITA IT Solutions vous propose un catalogue de formations Cloud qui vous permettront de développer vos connaissances techniques et méthodologiques sur le sujet ainsi que de développer vos compétences opérationnelles dans la prise de décision, la mise en place et la gestion d'infrastructure cloud. Google Cloud Platform Microsoft Azure Cisco Cloud Amazon Web Services FormationsGoogle Cloud Platform Infrastructure cloud AGCE - Architecting with Google Compute Engine AGCP-DP - Architecting with Google Cloud Platform: Design and Process GCF-CI - Google Cloud Fundamentals: Core Infrastructure GCP-FAP - Google Cloud Platform Fundamentals for AWS Professionals PPCAE - Preparing for the Professional Cloud Architect Examination NGCP - Networking in Google Cloud Platform SGCP - Security in Google Cloud Platform Data et Machine learning DEGCP - Data Engineering on Google Cloud Platform DIGCP - From Data to Insights with Google Cloud Platform GCF-BDM - Google Cloud Fundamentals: Big Data and Machine Learning PPDEE - Preparing for the Professional Data Engineer Examination Développement d'applications DAGCP - Developing Applications with Google Cloud Platform GCF-CI - Google Cloud Fundamentals: Core Infrastructure GCP-GSGKE - Getting Started with Google Kubernetes Engine Formations Microsoft Azure SITA IT s’entoure de partenaire Microsoft Azure pour offrir des formations et des certification complètes sur toutes les dernières technologies. Grâce à notre expertise dans le cloud et la virtualisation, nous avons accès à un large portefeuille de cours qui sont tous livrés avec des cours officiels Microsoft et des instructeurs certifiés Azure. Avec les nouvelles certifications Microsoft basées sur les rôles (Administrateur Azure, Développeur Azure, Architecte de solutions Azure, Ingénieur DevOps Azure), vous pouvez démontrer que vous suivez le rythme des rôles et des exigences techniques d'aujourd'hui. Développez vos compétences, prouvez votre expertise aux employeurs et à vos pairs, et obtenez la reconnaissance et les possibilités que vous avez acquises. Microsoft Certified Fundamentals AZ-900 Microsoft Azure Fundamentals Microsoft Certified Azure Administrator Associate AZ-103 Microsoft Azure Administrator (E-learning) AZ-104 Microsoft Azure Administrator Microsoft Certified Azure Developer Associate AZ-204 Developing solutions for Microsoft Azure AZ-203 Package: Developing Solutions for Microsoft Azure (E-learning) AZ-203 T01: Develop Azure Infrastructure as a Service compute solutions AZ-203 T02: Develop Azure Platform as a Service compute solutions AZ-203 T03: Develop for Azure storage AZ-203 T04: Implement Azure Security AZ-203 T05: Monitor, troubleshoot, and optimize Azure solutions AZ-203 T06: Connect to and consume Azure, and third-party, services Microsoft Certified Azure Security Engineer Associate AZ-500 Microsoft Azure Security Technologies Microsoft Certified Azure Solutions Architect Expert AZ-303 Azure Architect Technologies AZ-304 Microsoft Azure Architect Design FR-AZ30X : Fast Track Microsoft Azure Architect MC-AZSA-PACK : Microsoft Certified Azure Solutions Architect Expert Pack AZ-300 Package: Microsoft Azure Architect Technologies (E-learning) AZ-300 T01 Deploying and Configuring Infrastructure AZ-300 T02 Implementing Workloads and Security AZ-300 T03 Understanding Cloud Architect Technology Solutions AZ-300 T04 Creating and Deploying Apps AZ-300 T05 Implementing Authentication and Secure Data AZ-300 T06 Developing for the Cloud AZ-301 Package: Microsoft Azure Architect Design (E-learning) AZ-301 T01 Designing for Identity and Security AZ-301 T02 Designing a Data Platform Solution AZ-301 T03 Design for Deployment, Migration, and Integration AZ-301 T04 Designing an Infrastructure Strategy Microsoft Certified Azure Devops Engineer Expert AZ-400 : Designing and Implementing Microsoft DevOps Solutions AZ-400 Package : Microsoft Azure DevOps Solutions: Fast Track (E-learning) AZ-400T01 Implementing DevOps Development Processes AZ-400T02 Implementing Continuous Integration AZ-400T03 Implementing Continuous Delivery AZ-400T04 Implementing Dependency Management AZ-400T05 Implementing Application Infrastructure AZ-400T06 Implementing Continuous Feedback AZ-400T07 Designing a DevOps Strategy Formations Amazon Web Services SITA IT Solutions vous propose les formations nécessaires pour développer et exploiter des infrastructures et des applications dans le cloud AWS. Formations du cursus décideurs AWS AWS Business Essentials (AWSBE) Formations du cursus Architectes AWS AWS Technical Essentials (AWSE) Architecting on AWS (AWSA) Migrating to AWS (AWSM) Advanced Architecting on AWS (AWSAA) Formations du cursus Operations AWS AWS Technical Essentials (AWSE) Systems Operations on AWS (AWSSYS) Security Engineering on AWS (AWSSO) DevOps Engineering on AWS (AWSDEVOPS) Formations du cursus Developer AWS AWS Technical Essentials (AWSE) Developing on AWS (AWSD) DevOps Engineering on AWS (AWSDEVOPS) Formations du cursus Storage AWS AWS Technical Essentials (AWSE) Architecting on AWS (AWSA) Advanced Architecting on AWS (AWSAA) Formations Cisco Cloud UCSDF - Cisco UCS Director Foundation UCSDACI - Designing and Deploying Cisco UCS Director with ACI CLDCSR - Deploying Cloud Connect Solutions with Cisco Cloud Services Router 1000V SECCLD - Securing Cloud Deployments with Cisco Technologies SECICC - Introducing Cisco Cloud Consumer Security Road Map Microsoft Azure GooglCloudPlatform MicrosoftAzure CloudCisco AWS Ancre 1 Ancre 2

  • Ethical Hacking | Sita IT Solutions | Dubai, UEA, Middle East

    Ethical Haching Duration 5 days Public Price On demand Place Genève (Suisse) Dates 18 - 22 december 📌 📴 complet 📌 date confirmée 💻 distanciel 🚩 date presque garantie ⏱ décalage horaire 🇬🇧 langue anglaise Who should attend Prerequisite Objectives Outline Course Overview Maîtrisez les technologies du piratage en réfléchissant comme un hacker éthique Le programme Ethical Haching est le programme de formation en sécurité de l’information le plus désiré qu’un professionnel de la sécurité de l’information puisse jamais vouloir suivre. Pour maîtriser les technologies de piratage, il vous faudra en devenir un, mais éthique ! Le cours accrédité fournit les outils et techniques de piratage informatique avancés utilisés par les pirates et les professionnels de la sécurité de l’information pour s’introduire dans une organisation. Comme nous l’avons dit, “Pour battre un hacker, il faut réfléchir comme un hacker”. Découvrez les outils et les techniques avancés de piratage informatique Cette formation vous donnera toutes les connaissances et compétences pour maîtriser une méthodologie de piratage éthique et pour vous préparer à la Certification. Who should attend Responsables sécurité Auditeurs Professionnels de la sécurité Administrateurs de sites Toute personne concernée par la stabilité des systèmes d’information Prerequisite Connaissances de TCP/IP, Linux et Windows Server Objectives Maîtriser une méthodologie de piratage éthique qui pourra être utilisée lors d’un test d’intrusion Maîtriser les compétences de piratage éthique Ou tline Module 01 : Introduction au piratage éthique Module 02 : Empreinte et reconnaissance Module 03 : Analyse des réseaux Module 04 : Dénombrement Module 05 : Analyse de vulnérabilité Module 06 : Piratage du système Module 07 : Menaces liées aux logiciels malveillants Module 08 : Renifler Module 09 : Ingénierie sociale Module 10 : Déni de service Module 11 : Détournement de session Module 12 : Éviter les IDS, les pare-feu et les pots de miel Module 13 : Piratage de serveurs Web Module 14 : Piratage d’applications Web Module 15 : Injection SQL Module 16 : Piratage de réseaux sans fil Module 17 : Piratage de plates-formes mobiles Module 18 : Piratage d e IoT Module 19 : Informatique Cloud Module 20 : Cryptographie Inclus dans ce cours Un voucher d’examen Formation dispensée par un formateur certifié Accès aux labs officiels Documentation officielle au format digital prerequis contenu Objectifs Dates public

  • Formation IT à Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha - SITA IT SOLUTIONS

    Formations IT SITA IT SOLUTIONS s'appuie sur l'ensemble de ses Partenaires certifiés et référencés par chacun des Constructeurs et Editeurs pour vous apporter un panel de formations technologiques qui se veut le plus large possible, dans les métiers de l'IT. Les formations proposées sont qualifiantes, officielles, certifiantes et peuvent être organisées en cours sur mesure, en format Intra ou Bootcamp afin de s'adapter à votre environnement propre, votre équipement et vos locaux. Nos compétences métiers : Infrastructure IT (réseau, télécom, sécurité , Voix sur IP, communications unifiées, collaboration, video, data center, service provider, wifi, data center, virtualisation, outils d'administration, cloud, IoT ...) Développement Application Management (métiers de la DSI, gestion de projet, AMO SO...) Notre offre de formations informatiques avancées par thématiques, constructeurs ou éditeurs Cisco Chart Constructeurs Chart Cloud Computing Chart Virtualisation Chart Sécurité Cybersécurité Chart Méthodologie Chart Formations Cisco Chart Chart Chart Chart Chart Chart Chart Chart Chart Chart Cisco Enterprise Cisco Security Cisco Service Provider Cisco Collaboration Cisco Data Center Cisco DevNet Cisco DNA Cisco Cyber Cisco Meraki Cisco IOT Formations Cloud Computing Chart Chart Chart Chart Google Cloud Platform Microsoft Azure Cisco Cloud Amazon Web Services Formations Security Cybersecurity Chart Chart Chart Chart Chart Cybersecurity Legal security Organizational security Technical security Business continuity Formations Constructeurs Chart Chart Chart Chart Chart Chart Chart Chart Chart Chart Chart Chart Arista Aruba Cisco CheckPoint Extreme F5 Fortinet Huawei Juniper NetApp PaloAlto Ruckus Formations Editeurs Chart Chart Chart Chart Chart Chart Chart Chart Angular Ansible Citrix Mongo DB Python Red Hat Solarwinds WhatsUpGold Formations Virtualisation Chart Chart Chart Chart DataCore Docker Kubernetes Nutanix Formations Méthodologie Chart Chart Chart Chart Chart Agile Cobit ITIL PMI Prince2 Constructeurs Virtualisation Méthodologie

  • Emploi informatique (IT) à Dubai, Abu Dhabi, Riyadh, Kuwait City, Doha - SITA IT Solutions

    Nous sommes faits pour collaborer ! Vous êtes intéressé(e) par les offres de missions proposées par Dig-IT ! Nous vous proposons de nous faire connaître vos intérêts, disponibilité, et compétences afin d'échanger sur une collaboration éventuelle. * champ obligatoire Nom et Prénom Ville - Pays E-mail Téléphone Certifications en cours Votre CV Télécharger votre CV Taille fichier 15MB max. Profil Linkedin Zones d'intervention souhaitées (Villes, Régions,...) Acceptez-vous les déplacements ? Oui Non Compétences Manufacturers Avaya Check Point Cisco F5 Fortinet IBM Mitel Palo Alto Radware Stormshield Vidyo Autres Editors Ansible Citrix DataCore Software Docker / Kubernetes Java Linux Nutanix Puppet Python Simplivity SolarWinds Spring Windows WhatsUp Gold Autres Cybersecurity CompTIA EC Council Ethical Hacking Autres Methodology ITIL PMI PRINCE2 Méthodes Agiles Autres Sécurité infomatique Sécurité technique Sécurité juridique Sécurité organisationnelle Continuité d'activité Autres Big Data Intelligence Artifiicielle (IA) Big Data Autres Commentaires Situaton actuelle : Microentrepreneur Entreprise Salarié Autres ( à préciser dans commentaires) Tarif HT/ Jour Envoyer Vos informations ont bien été transmises

  • INNOVATIONS | Sita IT Solutions

    L'innovation au service de la performance Des solutions innovantes, exclusives et personnalisées pour répondre à vos besoins et plus encore. Sita IT Solutions vous permet d'accélérer le processus de transition numérique de votre entreprise en vous offrant des solutions clés en main et 100% adaptées à vos besoins. PC à projection tactile Innovant , disruptif , mobile et personnalisable , le Project'il est un PC made in France qui permet de réinventer vos interactions grâce à une projection tactile. Contactez-nous pour obtenir le vôtre UNE INTELLIGENCE ARTIFICIELLE UNIQUE SIMPLE SMART STUNNING

bottom of page