Sortare dupa
Filter
Online / Onsite Anulează filtru
Furnizor Anulează filtru
Tehnologie Anulează filtru
Localitate
Dificultate
VMware vSphere: Optimize and Scale
Configure and manage ESXi networking and storage for a large and sophisticated enterprise. Manage changes to the vSphere environment. Optimize the performance of all vSphere components.
Understanding Cisco CybersecurOperations Fundamentals v1.0
After taking this course, you should be able to: Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
Nutanix Advanced Admin.and Perform. Management 5.15
Implementing Automation for Cisco Collaboration Solutions
The Implementing Automation for Cisco Collaboration Solutions (CLAUI) v1.0 course teaches you how to implement Cisco® Collaboration automated, programmable solutions for voice, video, collaboration, and conferencing ...
Implementing Cisco Collaboration Conferencing
After taking this course, you should be able to: Describe the Cisco conferencing architecture including cloud, hybrid, and on-premises conferencing Describe the physical deployment options and deployment models for ...
Developing Solutionsfor Microsoft Azure
This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop ...
Implm. Cisco NX-OS Switches and Fabrics in the Data Center
Understanding Cisco Collaboration Foundations
After taking this course, you should be able to: Define collaboration and describe the main purpose of key devices in a Cisco collaboration on- premise, hybrid, and cloud deployment model Configure and modify ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security test Detect most common web application vulnerabilities Perform social engineering penetration test Analyze e-mail headers Analyze ...