{"id":6998,"date":"2020-04-02T12:35:07","date_gmt":"2020-04-02T10:35:07","guid":{"rendered":"https:\/\/relnet.hu\/?post_type=tribe_events&#038;eventDate=2020-06-16#038;p=5528"},"modified":"2020-06-12T19:37:07","modified_gmt":"2020-06-12T17:37:07","slug":"juniper-webinariumok-2020-06-16","status":"publish","type":"tribe_events","link":"https:\/\/relnet.hu\/en\/rendezveny\/juniper-webinariumok-2020-06-16\/","title":{"rendered":"Juniper webin\u00e1riumok"},"content":{"rendered":"<p>A Juniper Networks a COVID-19 j\u00e1rv\u00e1ny miatt elmaradt el\u0151ad\u00e1sait virtu\u00e1lisan tartja meg.<br \/>\nRegisztr\u00e1lni a Juniper Partner oldal\u00e1n t\u00f6rt\u00e9n bel\u00e9p\u00e9s ut\u00e1n lehet.<\/p>\n<h5>A webin\u00e1riumok sz\u00e9les v\u00e1laszt\u00e9k\u00e1t \u00e9s id\u0151pontjait itt tal\u00e1lja:<\/h5>\n<table style=\"height: 696px; width: 800px;\" border=\"1\">\n<tbody>\n<tr style=\"height: 27px;\">\n<td style=\"width: 141.19px; text-align: center;\"><strong>D\u00e1tum \/ id\u0151pont<\/strong><\/td>\n<td style=\"width: 642.81px; text-align: center;\" colspan=\"2\"><strong>El\u0151ad\u00e1s<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 126px;\">\n<td style=\"width: 141.19px;\"><span style=\"font-size: 12pt;\">j\u00fanius 15. 15:00-16:00<\/span><\/td>\n<td style=\"width: 236.3px;\"><span style=\"font-size: 12pt;\">From SD-WAN to the AI-Driven Enterprise<\/span><\/td>\n<td style=\"width: 400.51px;\"><a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/63c32a6b-a84f-4a6e-873b-aea15bafbb6d\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n<\/td>\n<\/tr>\n<tr style=\"height: 127px;\">\n<td style=\"width: 141.19px;\"><span style=\"font-size: 12pt;\">j\u00fanius 16. 15:00-16:00<\/span><\/td>\n<td style=\"width: 236.3px;\"><span style=\"font-size: 12pt;\">Datacenter Security<\/span><\/td>\n<td style=\"width: 400.51px;\"><a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/c341c4c4-b3d6-4df0-825a-fd4bb6b629e3\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n<\/td>\n<\/tr>\n<tr style=\"height: 127px;\">\n<td style=\"width: 141.19px;\"><span style=\"font-size: 12pt;\">j\u00fanius 17. 10:00-11:00<\/span><\/td>\n<td style=\"width: 236.3px;\"><span style=\"font-size: 12pt;\">Looking for Threats without Decrypting &#8211; Juniper Encrypted Traffic<\/span><\/td>\n<td style=\"width: 400.51px;\"><a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/be3b4f28-c998-4397-9732-e61bcd9682cd\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n<\/td>\n<\/tr>\n<tr style=\"height: 127px;\">\n<td style=\"width: 141.19px;\"><span style=\"font-size: 12pt;\">j\u00fanius 17. 15:00-16:00<\/span><\/td>\n<td style=\"width: 236.3px;\"><span style=\"font-size: 12pt;\">AI Driven Enterprise<\/span><\/td>\n<td style=\"width: 400.51px;\"><a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/fa9e663d-9615-4e3a-bd5e-cd1b5e64a6f4\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n<\/td>\n<\/tr>\n<tr style=\"height: 27px;\">\n<td style=\"width: 141.19px;\"><span style=\"font-size: 12pt;\">j\u00fanius 24. 15:00-16:00<\/span><\/td>\n<td style=\"width: 236.3px;\">\n<p><span style=\"font-size: 12pt;\">Juniper Security 2020 \u2013 1 Hour Review<\/span><\/p>\n<\/td>\n<td style=\"width: 400.51px;\"><a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/a1af4e02-7001-4455-a1dd-827471ecb6c4\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n<\/td>\n<\/tr>\n<tr style=\"height: 27px;\">\n<td style=\"width: 141.19px;\"><span style=\"font-size: 12pt;\">j\u00fanius 25. 15:00-16:00<\/span><\/td>\n<td style=\"width: 236.3px;\"><span style=\"font-size: 12pt;\">How to build your own topology using Juniper Cloud Labs (JCL)?<\/span><\/td>\n<td style=\"width: 400.51px;\"><a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/f1979300-a9cb-4284-aed4-7339f67a1e6c\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n<\/td>\n<\/tr>\n<tr style=\"height: 27px;\">\n<td style=\"width: 141.19px;\"><span style=\"font-size: 12pt;\">j\u00falius 1. 10:00-11:00<\/span><\/td>\n<td style=\"width: 236.3px;\">\n<p><span style=\"font-size: 12pt;\">Juniper Secure Analytics 2020<\/span><\/p>\n<\/td>\n<td style=\"width: 400.51px;\"><a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/0c68fa92-975e-4e61-8461-52fc558a562b\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n<\/td>\n<\/tr>\n<tr style=\"height: 27px;\">\n<td style=\"width: 141.19px;\"><span style=\"font-size: 12pt;\">j\u00falius 2. 15:00-16:00<\/span><\/td>\n<td style=\"width: 236.3px;\"><span style=\"font-size: 12pt;\">From SD-WAN to the AI-Driven Enterprise<\/span><\/td>\n<td style=\"width: 400.51px;\"><a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/ec0dac66-cd07-478f-9a8e-91da2568b5ae\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n<\/td>\n<\/tr>\n<tr style=\"height: 27px;\">\n<td style=\"width: 141.19px;\"><span style=\"font-size: 12pt;\">j\u00falius 8. 10:00-11:00<\/span><\/td>\n<td style=\"width: 236.3px;\"><span style=\"font-size: 12pt;\">Why Juniper Security Vision and Objection Handling<\/span><\/td>\n<td style=\"width: 400.51px;\"><a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/8d3525a9-2bb9-4f8c-88dd-ef2c87422136\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n<\/td>\n<\/tr>\n<tr style=\"height: 27px;\">\n<td style=\"width: 141.19px;\"><span style=\"font-size: 12pt;\">j\u00falius 15. 15:00-16:00<\/span><\/td>\n<td style=\"width: 236.3px;\"><span style=\"font-size: 12pt;\">Juniper Security Management &#8211; Matching Platforms to Deployment Scenarios<\/span><\/td>\n<td style=\"width: 400.51px;\"><a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/97d99622-973f-41a2-abee-9c8765d3e39f\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h5>Kor\u00e1bbi el\u0151ad\u00e1sok:<\/h5>\n<table style=\"height: 2041px; width: 800px;\" border=\"1\">\n<tbody>\n<tr style=\"height: 27px;\">\n<td style=\"width: 131.08px; height: 27px; text-align: center;\"><strong>D\u00e1tum \/ id\u0151pont<\/strong><\/td>\n<td style=\"width: 652.92px; height: 27px; text-align: center;\" colspan=\"2\"><strong>El\u0151ad\u00e1s<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 27px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">Datacenter Visibility Using Telemetry<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/courses\/4024\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">MEGN\u00c9ZEM<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 155px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">CSO Overview Platform Comparison<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/courses\/4025\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">MEGN\u00c9ZEM<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 155px;\">\n<td style=\"width: 131.08px; height: 154px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 154px;\">\n<p><span style=\"font-size: 12pt;\">Zero Touch Provisioning Masterclass with Sky Enterprise<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 154px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/courses\/4027\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">MEGN\u00c9ZEM<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 105px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">Contrail SD-WAN Solution<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/courses\/4030\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">MEGN\u00c9ZEM<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 155px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">DataCenter Fabric Automation<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/courses\/4028\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">MEGN\u00c9ZEM<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 155px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">SecIntel for a Threat-Aware Infrastructure<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/courses\/4032\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">MEGN\u00c9ZEM<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 155px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">Contrail SD-LAN Solution<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/courses\/4033\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">MEGN\u00c9ZEM<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 155px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">Detect, analyze and mitigate threats with Juniper: Online HANDS-ON WORKSHOP WITH JUNIPER ATP APPLIANCE<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/register.events.juniper.net\/jatponlinetrainingcopy\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 155px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">Why Juniper? Security Vision and Objection Handling<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/2e13b75d-56e2-45c0-9184-69e7a92a4fba\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 130px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">Data Center Fabric Automation<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/eae7b430-d886-4701-bd4e-2c3d5a0b1636\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 105px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">Detect, analyze and mitigate threats with Juniper: Online HANDS-ON WORKSHOP WITH JUNIPER ATP APPLIANCE<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/register.events.juniper.net\/jatponlinetrainingcopycopy\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 155px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">Detect, analyze and mitigate threats with Juniper: Online HANDS-ON WORKSHOP WITH JUNIPER ATP APPLIANCE<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/register.events.juniper.net\/jatponlinetrainingmay\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n\n<\/td>\n<\/tr>\n<tr style=\"height: 155px;\">\n<td style=\"width: 131.08px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">R\u00f6gz\u00edtett webin\u00e1rium<\/span><\/p>\n<\/td>\n<td style=\"width: 230.92px; height: 155px;\">\n<p><span style=\"font-size: 12pt;\">Looking for Threats without Decrypting &#8211; Juniper Encrypted Traffic<\/span><\/p>\n<\/td>\n<td style=\"width: 416px; height: 155px;\">\n<a class=\"button  button_size_2\" href=\"https:\/\/jpartnertraining.juniper.net\/event\/view\/aeba9eee-dfcc-4b1d-b826-7eb6cca771f3\"     target=\"_blank\"    title=\"\"><span class=\"button_label\">REGISZTR\u00c1CI\u00d3<\/span><\/a>\n\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h5><strong>Regisztr\u00e1ljon most!<\/strong><\/h5>\n","protected":false},"excerpt":{"rendered":"<p>A Juniper Networks a COVID-19 j\u00e1rv\u00e1ny miatt elmaradt el\u0151ad\u00e1sait virtu\u00e1lisan tartja meg. A webin\u00e1riumok sz\u00e9les v\u00e1laszt\u00e9k\u00e1t \u00e9s id\u0151pontjait itt tal\u00e1lja.<\/p>\n","protected":false},"author":1086,"featured_media":5534,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[1229,1226,1066,1227,1231,162,71,1038,1230,1228,69,68],"tribe_events_cat":[21,103,15,66],"yst_prominent_words":[],"class_list":["post-6998","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry","tag-contrail","tag-cso","tag-dc","tag-detection","tag-encrypted-traffic","tag-juniper","tag-juniper-networks","tag-sd-wan","tag-secintel","tag-sky-enterprise","tag-webinar","tag-webinarium","tribe_events_cat-juniper-networks","tribe_events_cat-oktatas","tribe_events_cat-viszontelado","tribe_events_cat-webinarium","cat_juniper-networks","cat_oktatas","cat_viszontelado","cat_webinarium"],"_links":{"self":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events\/6998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/users\/1086"}],"replies":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/comments?post=6998"}],"version-history":[{"count":0,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events\/6998\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media\/5534"}],"wp:attachment":[{"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/media?parent=6998"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tags?post=6998"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/tribe_events_cat?post=6998"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/relnet.hu\/en\/wp-json\/wp\/v2\/yst_prominent_words?post=6998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}