Implementing and Administering Cisco Solutions
This course gives you basic theory and practical knowledge of computer networks built on IPv4 and IPv6 protocols and provides a solid technical background for follow-up Cisco courses in all fields of technology.
Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention ...
Securing Email with Cisco Email Security Appliance
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort email security appliances to successfully manage and troubleshoot email traffic entering and leaving the enterprise ...
Microsoft Security, Compliance, and Identity Fundamentals
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions..
Implementing and Configuring the Cisco Identity Serv. Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
VMware vSphere: Install, Configure, Manage [V8]
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to ...
Implementing and Operating Cisco Security Core Technologies
This is the main course, which is designed to prepare for CCNP Security certification, and the test from this course is also used to complete the CCIE Security lab. This five-day course will prepare network security ...
MS365-Overview of accounts and possibility of integration
Five days of instructor-led training preparing students for MS-100 certification exam. At course completion students will be able: Office 365 overview Moving your organization to Office 365 Configuring Office ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
Implementing and Oper. Enterprise Network Core Technologies
The goal of this course is to develop the core networking skills needed to configure, operate, troubleshoot and manage Enterprise wired and wireless networks. It also requires you to understand and implement ...
Leveraging Cisco Intent-Based Networking DNA Assurance
The Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco Digital Network ...
Designing Cisco Enterprise Networks
The course provides CCNP-level network administrators with the knowledge and skills needed to design an enterprise network. This course is intended to be a deep dive into enterprise network design and an expansion ...