Tehnologie Anulează filtru
Microsoft 365 Identity and Services
At Course Completion By actively participating in this course, you will learn about the following: Designing, configuring, and managing your Microsoft 365 tenant Microsoft 365 product functionality Configuring ...
Microsoft Security, Compliance and Identity Fundamentals
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Microsoft 365 Security Administration
Microsoft 365 Certified: Security Administrator Associate Microsoft 365 Security Administrators proactively secure M365 enterprise and hybrid environments, implement and manage security and compliance solutions, ...
Microsoft Identity and Access Administrator
In this Microsoft Certified: Identity and Access Administrator Associate course, you’ll learn to design, implement and operate your business' identity and access management system by using Azure AD.
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention ...
Microsoft 365 Mobility and Security
The course concludes with an in-depth examination of Microsoft 365 identity synchronization, with a focus on Azure Active Directory Connect. You will learn how to plan for and implement Azure AD Connect, how to ...
In this course, students will learn how to support and configure Windows 10 desktops in an organizational environment. Students will develop skills that include learning how to install, customize, and update Windows ...
Managing Modern Desktops
About This Course In this course, students will learn how to plan and implement an operating system deployment strategy using modern deployment methods, as well as how to implement an update strategy.
Understanding CiscoCybersecurity Fundamentals
Describe network operations and attacks, basic cryptography concepts, and network infrastructure device operations Describe basic Windows and Linux OS operations, common network applications and attacks, ...
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...