Tehnologie Anulează filtru
Microsoft 365 Identity and Services
At Course Completion By actively participating in this course, you will learn about the following: Designing, configuring, and managing your Microsoft 365 tenant Microsoft 365 product functionality Configuring ...
Microsoft 365 Mobility and Security
The course concludes with an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect. You will learn how to plan for and implement Azure AD Connect, how to ...
Microsoft Security, Compliance and Identity Fundamentals
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Microsoft 365 Security Administration
Microsoft 365 Certified: Security Administrator Associate Microsoft 365 Security Administrators proactively secure M365 enterprise and hybrid environments, implement and manage security and compliance solutions, ...
Microsoft Identity and Access Administrator
In this Microsoft Certified: Identity and Access Administrator Associate course, you’ll learn to design, implement and operate your business' identity and access management system by using Azure AD.
Understanding Cisco CybersecurOperations Fundamentals v1.0
After taking this course, you should be able to: Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
In this course, students will learn how to support and configure Windows 10 desktops in an organizational environment. Students will develop skills that include learning how to install, customize, and update Windows ...
Managing Modern Desktops
About This Course In this course, students will learn how to plan and implement an operating system deployment strategy using modern deployment methods, as well as how to implement an update strategy.
Understanding CiscoCybersecurity Fundamentals
Describe network operations and attacks, basic cryptography concepts, and network infrastructure device operations Describe basic Windows and Linux OS operations, common network applications and attacks, ...