Search result for Voip systems Online Courses & Certifications
Get Course Alerts by Email
Learn everything about VoIP in 2019
by Rehan Training- 0.0
1 hour on-demand video
Traditional telephony is out and VoIP is gaining in popularity. VoIP PBX systems provide mobility to employees, flexibility when a business expands as they are much easier to manage than the traditional PBX...
$12.99
Internet of Things: Communication Technologies
by Ganz Chockalingam , Harinath Garudadri- 4.6
Approx. 6 hours to complete
In this course, you will learn how VoIP systems like Skype work and implement your own app for voice calls and text messages. Implement and demonstrate VoIP calls using the DragonBoard 410c. VOIP in a Nutshell Flavors of VoIP VoIP over Wireless Make your own VoIP application VoIP and the Smart Home...
VoIP PBX & Call Center on Asterisk 16 Issabel [Master Class]
by NEF System- 4.1
12 hours on-demand video
Do you want to expand your business and require a phone system, but legacy systems don't allow you? The core VoIP communication is based on Asterisk - The most powerful IP telephony platform. Proprietary systems invite a license fee for most Business-critical features and UC Features like mobility and third-party integration....
$14.99
FreePBX Asterisk 13 VoIP Server Administration Step by Step
by NEF System- 0.0
3 hours on-demand video
Learn FreePBX 14 VoIP Server Configurations & Deployment with Course Project Practical Examples & Use Cases. The core VoIP communication is based on Asterisk 13 - The most powerful IP telephony platform. Proprietary systems invites a license fee for most Business-critical features and UC Features like mobility and third party integration....
$14.99
Linux Command Line - From Zero to Expert
by Mohammad Nauman- 0.0
2.5 hours on-demand video
After taking this course, you will be all set to work with highly useful concepts such as Linux System Administration, setting up architectures for Machine Learning and Deep Learning, work with systems that enable VoIP and many many more areas....
$12.99
Asterisk Made Easy: Learn to Install Asterisk and Linux
by Jon Manning- 4.2
7.5 hours on-demand video
Learn how to install and configure Asterisk VoIP PBX on Linux to make phone calls following easy video tutorials Learn how to install and configure Asterisk VoIP PBX to make phone calls in 1 Day Once you follow the course and install a couple of Asterisk systems you will be an Asterisk expert....
$16.99
CISSP Certification: CISSP Domain 3 & 4 Video Boot Camp 2021
by Thor Pedersen | 234,000+ Enrollments Worldwide- 4.6
11.5 hours on-demand video
Secure operating systems and software architecture Industrial Control Systems SAN and VoIP protocols Prepare for the 2018 version of the Certified Information Systems Security Professional (CISSP) Certification Exam, which is what you will be tested on until the next CISSP curriculum update in 2021....
$18.99
Related searches
Beyond Basic Programming - Intermediate Python
by Mohammad Nauman- 0.0
3 hours on-demand video
Take your Python skills to the next level. Learn how expert programmers work with code and the techniques they use. So you have taken an initial programming course or have learned the basics on your own. So, the question is: how do you go from a beginning level programmer to the expert level?...
$12.99
IT Security Fundamentals: CompTIA Security+ 2015
by LearnSmart LLC- 0.0
24.5 hours on-demand video
Section 11: Network scanning is the scanning of public or private networks to find out which systems are running, their IP addresses, and which services they are running. Section 17: Cover the basics of packet sniffing, ARP cache poisoning, DNS spoofing, SSL sniffing, VoIP phone calls, and sniffing remote desktop connections....
$199.99
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Concepts for both public and private communication networks will be discussed....