Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention ...
TRN_SO_VYJ
You'll participate in 4 practical negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll see short films of negotiators and you'll learn from their ...
Microsoft Security, Compliance, and Identity Fundamentals
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions..
Implementing and Configuring the Cisco Identity Serv. Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
L1 (Foundation) for ArchiMate 3.1
The course guides you through the ArchiMate modeling language – standard for Enterprise architecture – explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
VMware vSphere: Install, Configure, Manage [V8]
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to ...
Implementing and Operating Cisco Security Core Technologies
This is the main course, which is designed to prepare for CCNP Security certification, and the test from this course is also used to complete the CCIE Security lab. This five-day course will prepare network security ...
MS365-Overview of accounts and possibility of integration
Five days of instructor-led training preparing students for MS-100 certification exam. At course completion students will be able: Office 365 overview Moving your organization to Office 365 Configuring Office ...
Fundamental of Cisco Firewall Threat Defense &Intrus. Prev.
This course is an updated version of the SSNGFW course. The goal of this course is to provide you with a solid foundation in Firepower Threat defense NGFW technology. You will gain the competency and skills required ...
ASA Firewall
This is a basic Cisco ASA firewall configuration course. This five-day course will prepare network security engineers for the basic skills and knowledge needed to configure Cisco ASA firewalls.
Advanced VPN for Cisco Routers
S4 is a four-day instructor-led course focused on VPN configuration of Cisco technologies. The curriculum covers detailed explanation of IPsec and IKEv2 protocol. The course also introduces the concept of IPsec VPN ...
Data Networks Security
The course is best suited for network administrators and network security engineers. The participants wil learn the basic principles of network security and its implementation of Cisco routers.
Configuring BIG-IP Access Policy Manager
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.