Tehnologie Anulează filtru
Microsoft Security, Compliance and Identity Fundamentals
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Microsoft Security Operations Analyst
About This Course Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to ...
Microsoft Identity and Access Administrator
In this Microsoft Certified: Identity and Access Administrator Associate course, you’ll learn to design, implement and operate your business' identity and access management system by using Azure AD.
Understanding Cisco Wireless Foundations
This course will help you: Learn the skills, technologies, and best practices needed to manage a Cisco WLAN network Understand and implement a Cisco wireless network architecture Design and implement WLAN maintenance ...
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention ...
Managing Microsoft Teams
What is Microsoft Teams and how the components work together How to implement Governance, Security and Compliance for Microsoft Teams How to prepare an organizations environment for a Microsoft Teams deployment.
Understanding CiscoCybersecurity Fundamentals
Describe network operations and attacks, basic cryptography concepts, and network infrastructure device operations Describe basic Windows and Linux OS operations, common network applications and attacks, ...
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
Understanding Cisco CybersecurOperations Fundamentals v1.0
After taking this course, you should be able to: Explain how a Security Operations Center (SOC) operates and describe the different types of services that are performed from a Tier 1 SOC analyst’s perspective.
Performing CyberOps Using Cisco Security Technologies
Designing and Implementing aData Science Solution on Azure
The Azure Data Scientist applies their knowledge of data science and machine learning to implementing and running machine learning workloads on Microsoft Azure; in particular, using Azure Machine Learning Service.