Professional Trainings & Certifications

IT Infrastructure, Network & Security

CISSP® (ISC)² International Information

System Security Certification Consortium

ISC2 CISSP

Project Management

Prince2® Foundation
Prince2® Practitioner
Projektmanagement Basiswissen

VMWare

VMWare vSphere

Check Point

Check Point GAiA
Check Point – Advanced Troubleshooting Workshop
Check Point – Advanced Troubleshooting Workshop

CISCO

Cisco – Designing for Cisco Internetwork Solutions
Cisco – Implementing Cisco IP Routing
Cisco – Interconnecting Cisco Network Devices
Cisco – Interconnecting Cisco Network Devices (Part 2)
CISCO – Securing Your Email with Cisco IronPort C-Series – Email Security Appliance – ESA

Extreme Networks

Extreme Networks – Extreme Networks Specialist
Extreme Networks – Extreme Networks Associate
Extreme Networks – Extreme Configuration Fundamentals
Extreme Networks – Extreme Interior Gateway Protocols
Extreme Networks – Extreme Muticast
Extreme Networks – Extreme Redundancy Fundamentals
Extreme Networks – Extreme Security Fundamentals

Microsoft

Microsoft – MOC 2821 Designing and Managing a Public Key Infrastructure
Microsoft – MOC 10135 Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010

F5 Networks

F5 Networks – BIG-IP LTM Advanced Topics
F5 Networks – BIG-IP LTM Essentials

Blue Coat (Symantec)

Blue Coat – Certified Proxy Professional

Veritas

VERITAS – Enterprise Vault

NetApp

NetApp – Data ONTAP Fundamentals
NetApp – Data ONTAP for MS Windows Application Server (SAN / iSCSI)

Juniper Networks

Juniper Networks – Implementing NetScreen Security Gateways
Juniper Networks – NetScreen Management, Troubleshooting and Performance Tuning
Juniper Networks – Advanced IPSec VPN Implementations

Network

Fast Lane – Packet Analysis Power Workshop
Quality of Service (QoS) for VoIP

IT Forensic

IT Forensik
Advanced IT Forensik

IT Service & ITIL

ITIL V3
SITA Excellence in Action Award
SITA – Excellence Through Service