Sortare dupa
Filter
Online / Onsite Anulează filtru
Termen garantat
Furnizor Anulează filtru
Tehnologie Anulează filtru
Localitate
Dificultate
Introducing Cisco Unified Computing System v1.0
Describe Cisco UCS server hardware Describe Cisco UCS connectivity Describe the Cisco HyperFlex Data Platform, its data writing and reading processes, and data optimization Describe and configure Cisco UCS service ...
Implementing and Operating Cisco Security Core Technologies
This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. This exam tests a candidate's knowledge of implementing and operating core security ...
Implementing Cisco Application Centric Infrastructure Advanc
In this training, we will teach participants how to take advantage of the capabilities of Cisco Nexus 9000 switches in Cisco ACI (Application Centric Infrastructure) mode. Participants will learn how to configure and ...
Securing Email with Cisco Email Security Appliance v3.1
This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA), which leads to CCNP® Security and the Certified Specialist - Email Content Security certifications.
Microsoft Cloud for Sustainability
This course is designed for individuals willing to learn about Microsoft Cloud for Sustainability. It is targeting and will be most beneficial to the following two roles: cloud specialist and sustainability industry ...
Cortex XSOAR: Automation and Orchestration
This training is designed to enable a SOC, CERT, CSIRT, or SOAR engineer to start working with Cortex XSOAR integrations, playbooks, incident-page layouts, and other system features to facilitate resource ...
Microsoft Azure SecurityTechnologies
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities.
Microsoft 365 Administrator
This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance.
Configuring BIG-IP Local Traffic Manager
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Firewall: Configuration and Management (EDU-210)
Successful completion enhances participants’ understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a ...
Securing Networks with Cisco Firepower Next Gen. Firewall
This class will help you: Implement Cisco Firepower NGFW to provide advanced threat protection before, during, and after attacks Gain leading-edge skills for high-demand responsibilities focused on security Earn 40 ...
Protect Against Malware Treats with Cisco AMP for Endpoint
After taking this course, you should be able to: ? Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) ? Recognize the key features and concepts of the AMP for Endpoints product ? ...
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Implementing and Operating Cisco DC Core Technologies
This course will help you: Gain experience implementing, securing and automating network, compute, and storage infrastructure Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on ...
Implementing and Configuring Cisco Identity Serv. Engine
This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP® Security and the Cisco Certified Specialist - Security Identity ...