Avamar Management
The Avamar Management course equips participants with the knowledge and skills to administer, monitor, and...
We would like to inform you that both our Computer Pride Nairobi and Mombasa offices will be closed completely from Wednesday, 19th July 2023 to Thursday, 27th July 2023. We will resume our regular operations on Friday, 28th July 2023.
This closure is in observance of the special Ashara Mubaraka prayers. In case of any urgent inquiries or assistance, please feel free to contact us at info@computer-pride.co.ke.
The Avamar Management course equips participants with the knowledge and skills to administer, monitor, and...
This 2-day course provides network administrators, operators, and engineers with a working understanding of the...
This 3-day hands-on course gives networking professionals a solid foundation in iRules development on the...
The NGINX Workshop is a 2-day, hands-on course that teaches you how to administer, configure,...
Learn to deploy and manage F5 SSL Orchestrator for stronger security, efficiency, and return on...
This 2-day course combines lectures and hands-on labs to give participants practical experience with BIG-IQ®....
This 3-day course gives network professionals practical skills in BIG-IP Local Traffic Manager (LTM), covering...
This course gives networking professionals a practical understanding of how to use and manage the...
This course gives network administrators, operators, and engineers a practical understanding of BIG-IP Access Policy...
This course combines lectures and hands-on labs to give participants practical experience in setting up...
This course gives students a practical understanding of how to deploy, configure, and manage F5...
This course introduces network administrators, operators, and DevOps engineers to the core and F5-specific technologies...
This course introduces network administrators, operators, and DevOps engineers to the key technologies—both foundational and...
This course is designed for network administrators, operators, and engineers who want a solid understanding...
5-Day Bundle Course: BIG-IP Training This bundle includes two courses: 1. Administering BIG-IP v15.1 (2...
The CCOAâ„¢ certification from ISACA hones technical skills for assessing threats, detecting vulnerabilities, and proposing...
In this course, you will learn about FortiSOAR architecture, and how to deploy, configure, manage,...
In this course, you will learn the fundamentals of using FortiAnalyzer for centralized logging. You...
In this course, you will learn how to deploy, configure, and troubleshoot secure wireless LAN...
In this interactive course, you will learn how to deploy, provision, and manage a FortiSwitch...
In this course, you will learn how to deploy, configure, and secure FortiAnalyzer. You will...
In this course, you will learn how to use FortiAuthenticator for secure authentication and identity...
In this course, you will learn how to leverage the powerful and diverse capabilities of...
In this course, you will learn how to use the FortiClient EMS features, provision FortiClient...
In this course, you will learn the fundamentals of using FortiManager for the centralized network...
In this course, you will learn how to use the most common FortiGate features. In...
The Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v2.0 e-learning course shows you...
Cybersecurity professionals require a well-rounded understanding of the tools, processes, and strategies that can be...
The stakes for software security are very high, and yet many development teams deal with...
A single email can lead to a multi-million dollar breach in seconds, and the employee...
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data...
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure...
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based...
This course provides IT Identity and Access Professional, along with IT Security Professional, with the...
This course provides professionals with a strong understanding of business continuity and disaster recovery principles,...
This course provides individuals with the necessary knowledge and skills to protect their information assets....
The Data Protection module sets out essential knowledge relating to data protection concepts and principles,...
In this course, you will master the skills and technologies you need to implement core...
In this course students will gain the knowledge and skills needed to implement security controls,...
This Cyber Security course allows candidates to understand the main concepts underlying the secure use...
EC-Council’s CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral...
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioural analytics to networks...
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core...
Certified Network Defender CND v2 provides a comprehensive approach to effectively deal with security issues...
Certified Ethical Hacker CEH v113 will teach you the latest commercial-grade hacking tools, techniques, and...
The Level 5 Diploma in Computing (with Cyber Security (L5DC CS) (previously Level 5 Diploma...
 Click here to download our Training Schedule.