Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Microsoft 365 - Modern Desktop Administrator 1
Five days of instructor-led training preparing students for MD-100 certification exam..
NSX: Install,Configure, Manage [V4.0]
This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment. This course covers key features and functionality offered in the NSX 4.
Microsoft Power Platform Developer
The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes. In this course, students will learn how to build Power Apps, ...
Microsoft Identity and Access Administrator
This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and it ...
Azure Network Engineer Associate
This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. This course covers the process of designing, implementing, and managing core Azure networking infrastructure, ...
Azure Data Engineer Associate
In the course, you will learn about the Azure Synapse Analytics service, which combines a relational data warehouse built on Microsoft SQL Server together with modern approaches based on big data analysis using ...
VMware vSAN: Install, Configure, Manage V8
During this four-day course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster. You will learn about managing and operating vSAN. This course focuses on building the required ...
Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention ...
Microsoft Security, Compliance, and Identity Fundamentals
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions..
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
MS365-Overview of accounts and possibility of integration
Five days of instructor-led training preparing students for MS-100 certification exam. At course completion students will be able: Office 365 overview Moving your organization to Office 365 Configuring Office ...
Splunk Administration
The training aims to give participants the knowledge needed to understand, manage, configure, design, and troubleshoot Splunk deployment. This course is focused on architecture, license management, configuration, and ...