Skip to Content

All Courses

🧠 ITSec - Basic Networking Exam
🧠 ITSec - Basic Networking Exam

Welcome to the ITSec Basic Networking Exam Course!

This course is designed to give you a solid foundation in computer networking concepts. Through a series of structured chapters, you will learn about network types, IP addressing, DNS and DHCP basics, transport layer protocols, the OSI model, and essential network security principles.

Whether you are preparing for a certification, starting your career in IT, or simply expanding your knowledge, this course provides the essential skills and understanding you need to confidently navigate modern networks.

Each chapter includes clear study materials, quizzes, and visual aids to help reinforce your learning and prepare you for the final assessment. Let's start building your networking knowledge step by step!

ENG
🌐 ITSec - MPLS VPN Course
🌐 ITSec - MPLS VPN Course

Welcome to the ITSec MPLS VPN Course!

This course is designed to give you a solid, practical understanding of MPLS VPNs, one of the core technologies used by service providers and large enterprises today. You'll learn how MPLS works, how to configure Layer 2 and Layer 3 VPNs, and how to apply these skills in real-world networks. Whether you're preparing for a certification or working in the field, this course will help you build, secure, and troubleshoot MPLS VPN environments with confidence.

ENG
🔐 ITSec - Cyber sigurnost na djelu
🔐 ITSec - Cyber sigurnost na djelu

U današnjem digitalnom okruženju, cyber sigurnost više nije izbor – ona je nužnost.

Sve više smo izloženi različitim oblicima prijevara i kibernetičkih prijetnji. Phishing, lažni e-mailovi, prijevare putem SMS-a i telefona te kompromitirani poslovni računi samo su neki od izazova s kojima se zaposlenici svakodnevno mogu susresti. Cilj ove radionice je pružiti praktična znanja i alate koji će vam pomoći da prepoznate prijetnje na vrijeme i zaštitite sebe, svoje podatke i poslovanje.

Cyber sigurnost na djelu znači učenje kroz praksu – jer teorija nije dovoljna kada je sustav pod napadom.

CRO