Blokovne verige in IoT Recommended Namen delavnice je spoznati vlogo in realne možnosti tehnologije porazdeljenih knjig (Distributed Ledger) in blokovnih vergih (Blockchain) na področju interneta stvari. Spoznali boste ključne prednosti in ključne perfromančne, varnostne in cenovne omejitve rešitev blokovnih verig na področju IoT. Seznanjeni boste z ekosistemi za razvoj in uporabo decentraliziranih aplikacij ter znali na svojem področju realno vrednotiti možnosti in izbrati ustrezen pristop k izvedbi rešitev z blokovnimi verigami za IoT.
DPI – Deep Packet Inspection Recommended In this course, expert-level training is provided on deep packet inspection principles, techniques and areas of applicability. The attendees receive a comprehensive insight into legal monitoring concepts in telecommunications systems, types of traffic capture principles, and available and future DPI-based applications. Detailed attention is placed on technical requirements and options of DPI application into operator environments and agencies.
Multicast in IP networks Recommended The course gives an overview how to deploy and manage multicast in IP and Ethernet based networks. You will get insight into multicast technology which is the basis for many fast growing services like IPTV and Internet TV. The course presents different service models, addressing and routing protocols for broadcasting to multiple recipients. The practical part of the course includes configuration and testing of multicast mechanisms on network equipment.
QoS and QoE assurance in modern telecommunications Recommended This course provides and expert-level training on principles, systems, techniques and approaches to QoS and QoE assurance in various modern communications systems. Emphasis is placed on QoS/QoE challenges in modern IP-based service environments. The attendees are provided with detailed insight into quality assurance in VoIP, NGN, Internet and IPTV systems, followed by practical experience and real-world demos of QoS measurements procedures and techniques, and a system for QoE service assessment.
Routing in IP networks I Recommended The course gives an overview of routing in IP networks, the basics of packet commutation and IP network routing, addressing, important routing protocols and algorithms and their use.
Routing in IP networks II Recommended The course gives a comprehensive overview of advanced level topics on IP routing. A variety of routing protocols are presented and examined, followed by insight into advanced routing functions and hands-on experience in advanced routing protocol configurations.
BGP routing Recommended This expert-level course deals with BGP routing protocol, it`s mechanisms and principles of operation. Attendees aquire valuable practical skills with configuring BGP routing on network equipment.
IP network infrastructure testing and verification Recommended The course provides expert-level knowledge, skills and practical experience in IP network infrastructure testing, measurements and verification procedures. Theoretical knowledge on test and measurement principles and verification standards and procedures is enhanced with hands-on lab practices focused on performance tests of routers and switches using professional measurement equipment.
Video on Demand Recommended Meet the requirements, trends and technology video on demand.
Sodelovalna in videokonferenčna okolja za izvedbo poučevanja na daljavo Recommended Tečaj je namenjen pedagogom, ki se želijo spoznati z okolji in orodji, ki jim omogočijo poučevanje na daljavo. Zaradi situacije, ki zahteva, da se določen del učnega procesa izvaja na daljavo, je potrebno vedeti v katerih okoljih in s katerimi orodji se posamezni pedagog lahko opolnomoči, da je izvedba učnega procesa na daljavo karseda intuitivna, inovativna in preprosta, tako na strani same izvedbe procesa kot tudi za udeležence.
Trajanje: 2 x 4 ure. Prvi del teorija, drugi del v praktični obliki.
Metro Ethernet Recommended Course presents an overview of the functionality of Metro Ethernet network systems. Standardized service models, service attributes, basic services EPL, EVPL and ELAN and technologies to deliver Metro Ethernet services are covered in depth. Furthermore Metro Ethernet VPN services, providing high availability, QoS and OAM functionality to Metro Ethernet systems are presented. The practical part shows a demo of Metro Ethernet Service OAM mechanisms and hands-on lab.
Advanced Ethernet mechanisms Recommended Closing date: 09.09.2013, 12:00 The course provides a valuable insight into Ethernet technology, characteristics, features and services, focusing on its portfolio of advanced mechanisms for availability and quality assurance, security services and virtualization. The course is completed with overview of best practices in Ethernet technology deployment into real-world environments.
Basics on TCP/IP and Ethernet Recommended Closing date: 12.09.2013, 12:00 The course deals with basic concepts and principles of modern internet network protocols. Main mechanisms, services and applications as well as tools for monitoring and analysis of protocols in IP networks are presented. This course serves as a base course for many other courses in the field of network technologies.
Architecture and concepts of the Internet of Things Recommended In the training you will learn about the architectural guidelines, concepts and technologies in the Internet of Things. We will present the latest trends and best practices in setting up the "smart" systems and establishing "smart services" on the segments of infrastructure management and urban traffic, e-health, smart energy grids.
Interactive TV Recommended Nowadays we are accustomed to constant access to the Internet and social or business networks. Interactive applications on different devices (mobile terminals, computers, …) are making this possible. Television is joining to this devices and the role of typical television user is changing from passive to active participant. Interactive TV enables the viewer to influence the course of tv programme, access video on demand (VoD) or any other web service which are carefully tailored for the television.
Wi-Fi I Recommended This course provides advanced-level training on Wi-Fi technologies, concepts, principles, mechanisms and the respective service architectures. Architecture and elements are presented in the scope of available standards, followed by detailed insight into security, quality and other issues of this technology. The training is completed with hands-on exercises.
Enterprise Wi-Fi (Wi-Fi II) Recommended This course provides advanced-level training on Enterprise Wi-Fi technologies, concepts, principles, mechanisms and the respective service architectures. Architecture and elements are presented in the scope of available standards, followed by detailed insight into security, quality and other issues of this technology. The training is completed with hands-on exercises. Enterprise WISP case is also presented.
Introduction to the Internet of Everything Recommended The Introduction to the Internet of Everything course provides an overview of the concepts and challenges of the transformational IoE economy. The course discusses the Internet and its evolution to the interconnection of people, processes, data, and things that forms the Internet of Everything. The course introduces the concept of a network foundation connecting billions of things and trillions of gigabytes of data to enhance our decision making and interactions. Machine-to-machine (M2M), machine-to-people (M2P), and people-to-people (P2P) connections in an IoE solution are also covered.
Introduction to Cybersecurity Recommended Cybersecurity refers to the people, products, and processes that protect electronic data from those with malicious intent. This course introduces students to networking professionals who discuss the exciting and growing industry of cybersecurity. The course modules define cybersecurity, explain why it’s important, and introduce the products and processes used to secure data.
Napredni mrežni protokoli in varnost Recommended Tečaj predstavlja izbrane vsebine iz koncepta nadzorovanja telekomunikacijskih sistemov, varnosti, vdorov in napadov na omrežja, različnih vrst zajemanja prometa, uporabe globinskega pregleda paketov ter različnih znanj iz področja mrežnih protokolov.
Signalizacije Recommended Program obravnava signalizacijsko-krmilne protokole in arhitekture v omrežjih naslednje generacije (NGN). Predstavi trenutno stanje v telekomunikacijskih omrežjih in predstavi primere dobre prakse.
S poudarki na posameznih temah se vsebino lahko prilagoditi potrebam slušateljev.
Business VoIP Solutions Recommended Training shows an overview of the current VoIP solutions in enterprise environments. Relevant architecture, the possibility of connecting to external channels of communication, integration with back office systems and some applications that add value to the end user are presented. Emphasis is also placed on concerns regarding security and privacy.
Security in WiFi networks Recommended Adequate security mechanisms and security politics are perquisite for connecting information systems via private or public Wi-Fi networks, realization of business transactions in internet networks and maintaining integrity and privacy while using the services.
The course presents basic services and mechanisms of data encrypting, mechanisms and procedures for enforcing security of communication services, devices and systems. The practical part of the course includes a demonstration of a PKI concept and an example of breaking WEP encryption.
Telecommunications in SmartGrid Recommended The course provides a basic overview of the SmartGrid concept and related challenges and issues of its integration with telecommunications systems and services. Details are given on service requirements, required infrastructure, protocols as well as challenges in deployment, configuration and management of telecommunications services in the SmartGrid environment. The course is topped with an insight into current SmartGrid environments and a demo presentation of a pilot project.
Planning and evaluating the user experience Recommended The workshop presents the importance of a good user experience of services and products, key planning procedures and user experience evaluation methodology and other trends and standards in this field of work.
Asterisk Recommended The course covers the knowledge and skills that an advanced Asterisk administrator should know to be effective at his or her job. Short introduction on SIP protocol is provided. The main attention is then focused on administrating various services inside Asterisk and also developing proprietary services using Asterisk Manager Interface (AMI). Course encompasses numerous practical examples (using Asterisk appliances), besides providing the theoretical basis.
HTML5 Recommended The boundary between the client web applications and desktop applications are blurring. Modern web applications based on HTML5 support drag & drop of files directly into the browser, hold connection to the server via a Websocket that practicaly enables communication in real time, and are closely integrated with the capability of devices (positioning via GPS, inquiry about the orientation of device etc.). WebGL standard supported browser is becoming environment for rich 3-D applications and games, creating a platform that is truly independent of the hardware. HTML5 is already widely supported by desktop web browsers, much of its functionality is supported by virtually all mobile devices (Android, iPhone, iPad). HTML5 exceeds the framework of isolated development environment and stands for platform that supports the development of rich interactive applications capable of autonomous operation anywhere.
Co-creation of solutions with high economic, social and environmental impact Recommended Participants are involved in the creative process of open innovation where they identify, design and evaluate new (digital) services or solutions using the SEROI + methodology (social, economic, environmental return on investment with open innovation). The topics for the workshop come from the priorities of business strategies or policies. The evaluation of the investment is done through economic, social and environmental indicators.
RFID and NFC Recommended The course provides an overview of the RFID technology family with an emphasis on use of the near field communication technology NFC and possibilities of future services with regards to NFC support in modern mobile terminals.
Development of decentralized applications for Ethereum Recommended Participants learn about key aspects of operation, architecture and elements of decentralized applications (DApp) -
applications for the Ethereum block chain, including end devices, user interfaces and smart contracts. In practical part the participants will make a simple smart token contract, deploy and run it on the Ethereum network. They will create a simple web interface or nodejs application for access to smart contract functions and the Ethereum block chain.
CCNP ENCOR (350-401) Recommended Main module Implementing and Operating Cisco Enterprise Network Core Technologies.
This module focuses on your knowledge of enterprise infrastructure including dual-stack (IPv4 and IPv6) architecture, virtualization, infrastructure, network assurance, security, and automation.
IoT infrastrukture v oblaku - napredno Recommended Napredna, izrazito praktično naravnana delavnica, kjer se boste v treh dneh spoznali s ključnimi tehnologijami, ki jih sodobna IoT rešitev zajema, s poudarkom na visoki razpoložljivosti in tehnologijah, ki omogočajo večje obremenitve.
IoT Fundamentals: Raspberry Pi and IoT Recommended Izrazito praktična delavnica, kjer se predstavijo ključna področja, ki jih moramo poznati pri izdelavi različnih rešitev Interneta stvari (IoT) skozi uporabo Raspberry Pi in IoT oblačnih storitev. Tečaj se zaključi z izdelavo IoT izdelka in certifikacijo "Cisco IoT Fundamentals: Connecting things".
Security in IP networks Recommended Adequate security mechanisms and security politics are perquisite for connecting information systems via private or public IP networks, realization of business transactions in internet networks and maintaining integrity and privacy while using the services. The course presents basic services and mechanisms of data encrypting, mechanisms and procedures for enforcing security of communication services, devices and systems. The practical part of the course includes a demonstration of a PKI concept, an example of breaking WEP encryption and configuration of working IPSec protocol.
Virtual and augmented reality (VR/AR) Recommended Participants will get to know and practically experience state-of-the-art augmented and virtual reality devices and applications. The emphasis is on experience of use, as well as the technical aspects of the operation of these devices.
Introduction to Linux 1 Recommended Knowledge of Linux is a helpful skill for a wide variety of careers in business and Information Technology fields. Many emerging and growing career opportunities including big data, cloud computing, cyber security, information systems, networking, programming and software development (to name a few) require basic to advanced knowledge of the Linux command line.
Trends in 4.5G and 5G Recommended Learn about trends in cellular and mobile systems with a focus on 5G networks and technologies.
Blockchain and Bitcoin Recommended For the past few years, value growth and innovation in the field of cryptocurencies, especially Bitcoin, have been noticeable. Within this course we will explain the technical and non-technical aspects of why it is so interesting for many users, innovative entrepreneurs and investors.
IoT Fundamentals: Arduino and connecting things Recommended Series of workshops with focus on practical work. By the end of the course the participants will make their own prototype of IoT solution and have the possibility to obtain a Cisco IoT Fundamentals: Connecting Things certificate.
CCNA 2: Switching, Routing, and Wireless Essentials Recommended Describes the architecture, components, and operations of routers and switches in a small network. Attendees learn how to configure a router and a switch for basic functionality. By the end of this course, students will be able to configure and troubleshoot routers and switches and resolve common issues with RIPv1, RIPv2, single-area and multi-area OSPF, virtual LANs, and inter-VLAN routing in both IPv4 and IPv6 networks.
Programming essentials in C++ Recommended Why C++? It is omnipresent, people use numerous C++ powered devices on a daily basis, whether they realize it or not. There have been millions (well, actually billions) of lines of code written in C++, which means almost unlimited opportunities for code reuse and learning from well-crafted examples. It is simple, readable, and flexible. It has been the backbone of a number of other languages (e.g. Java derives much of its syntax from C/C++). It is versatile, portable, and fast. There is a large and very activeC/C++community. It will give you a solid foundation and allow you to learn other programming languages much easier and much faster.
IoT Fundamentals: Data analytics in Python Recommended Izrazito praktična delavnica, kjer se predstavijo ključna področja, ki jih je treba poznati pri obdelavi podatkov v Python-u. Udeleženci se na začetku spoznajo s programskim jezikom Python in njegovimi knjižnicami za obdelavo podatkov. Poudarek je na praktičnem delu ter reševanju realnih primerov.
IoT Security Recommended Specific ICT security challenges of the IoT systems are presented.
Digitalizacija: Spremembe v poslovnem in tehnološkem okolju Recommended Digitalna akademija DA! pomaga podjetjem hitreje oceniti lastno digitalno zrelost, razumeti logiko v ozadju digitalnih procesov in oblikovati konkretne korake na poti do digitalne transformacije oziroma učinkovite načrte za prehod na nove načine delovanja.
5G in vertical domains Recommended Training will address the basics of 5G technology and the application of technology across sectors.
Cloud: Virtualization, NFV and SDN Recommended Overview of technologies, trends and standardization in the field of SDNs and NFV concepts. Get insight into concrete approaches and implementations of SDN networks in industry.
CCNA 3: Enterprise Networking, Security and Automation Recommended Describes the architecture, components, and operations of routers and switches in a large and complex network. Students learn how to configure routers and switches for advanced functionality. By the end of this course, students will be able to configure and troubleshoot routers and switches and resolve common issues with OSPF, EIGRP, STP, and VTP in both IPv4 and IPv6 networks. Students will also develop the knowledge and skills needed to implement DHCP and DNS operations in a network.
CCNP ENARSI (300-410) Recommended Concentration module Implementing Cisco Enterprise Advanced Routing and Services.
Implementing and Operating Cisco Enterprise Network Core Technologies.
This module addresses professional knowledge and skills needed to design and maintain computer networks and advanced configurations. The emphasis of the concentration module is on advanced routing and network scalability.
IoT Fundamentals: Big Data Recommended Izrazito praktična delavnica, kjer se boste ukvarjali z obdelavo velike količine podatkov. Predstavljene so osnove Big Data, nato pa je poudarek na praktičnem delu ter reševanju realnih primerov. Tečaj se zaključi s Cisco certifikacijo "IoT Fundamentals: Big Data & Analytics".
Introduction to Linux 2 Recommended NDG Linux II is the second course in a 2-course series for aspiring Linux system administrators. Develop proficiency in performing maintenance tasks on the command line, installing and configuring a computer running Linux, and configuring basic networking, using virtual machines running Linux.
CCNA Cybersecurity Operations Recommended Tečaj obravnava problematiko kibernetske varnosti ter usposablja za vlogo kibernetskega analitika.
Udeleženci se spoznajo z različnimi vrstami kibernetskih napadov in ranljivostmi naprav, storitev ter aplikacij. Spoznajo ključno vlogo kriptografije in zaščite podatkov v prenosnih omrežjih.
Ob koncu tečaja bodo sposobni uporabljati orodja za analizo kibernetskih napadov, spremljati varnostne alarme ter določiti okužene naprave in izvore napadov. Znali bodo učinkovito zaščititi omrežje, naprave in podatke.
Spoznajo tudi dobre prakse in odzivni proces v primeru kibernetskega incidenta.
CCNA 1 – Introduction to Networks Recommended Introduces the architecture, structure, functions, components, and models of the Internet and computer networks. The principles of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, attendees will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes.
3D modeling and animation in Blender environment Recommended The use of animated 3D models is on the rise with all multimedia platforms; therefore the workshop is suitable for anyone who desires to venture into the world of 3D models and gain knowledge in the animation domain.
Video and audio through IP networks Recommended Video and audio systems based on IP infrastructure have become well established and widely used. Lectures and tutorial labs provide basic information about the operation and features of AVoIP systems.
Internet of Things communication technologies Recommended Training is suitable for all who need to know the trends in the modern communications technologies of the Internet of Things and to understand the specifics of low-energy wireless technologies.
Cyber Security Starts: 15.12.2020, 08:30 Security in communication networks will always be a challenge in any type of organizations. Network administrators are aware of many dangers and unpleasant consequences that organization can face due to lack of network security. Good network administrators are aware of cyber threats, and that preventing attacks takes more than having the right firewalls and software. If they want to obtain a secure network, they need to know the weaknesses of their own system plus they need to understand the cybercrime itself.
At the course participants gain insight into the real life security threats, and learn to work with security mechanisms. Special focus is placed on preventive actions and identifying weak points of the network.