Sort by
Filter
Online / Onsite
Guaranteed term
Vendor
Technology
Location
Difficulty
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
VMware vSphere with Tanzu: Deploy, Configure, Manage [V8]
During this three-day course, you focus on deploying and managing VMware vSphere® with VMware Tanzu® in a VMware vSphere® 8 environment. You learn how vSphere with Tanzu provides services to deploy and manage virtual ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
vCenter Site Recovery Manager: Install, Configure, Manage
This two-day, hands-on training course gives experienced VMware vSphere® administrators the knowledge to install, configure, and manage VMware Site Recovery Manager™ 8.2. This course also shows you how to write and ...
Azure Security Engineer Associate
Four days of instructor-led training preparing students for AZ-500 certification exam. At course completion students will be able: Describe specialized data classifications on Azure Identify Azure data protection ...
Quantitative risk analysis
Understand the importance of risk analysis for cyber security Know how to do risk analysis Learn to perform a basic risk analysis and use it to solve problems in cyber security .
Troubleshooting BIG-IP LTM
This course will provide system and network specialists with knowledge and hands-on experience with the methodology and tools for solving problems associated with BIG-IP LTM system configuration and administration.
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
Aria Automation: Install, Configure, Manage
During this five-day course, you focus on installing, configuring, and managing VMware Aria Automation 8.10™ on-premises systems. You learn how it can be used to automate the delivery of virtual machines, ...
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
DevOps Engineer Expert
This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate ...
Windows Server Hybrid Administrator Associate
This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage ...
Microsoft 365 - Fundamentals
This course provides foundational knowledge on the considerations and benefits of adopting cloud services and the Software as a Service (SaaS) cloud model, with a specific focus on Microsoft 365 cloud service offerings.