Tehnologie Anulează filtru
Microsoft Security Operations Analyst
About This Course Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to ...
Microsoft Security, Compliance and Identity Fundamentals
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Firewall: Configuration andManagement (EDU-210)
Goals The Palo Alto Networks Firewall 10.2 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo ...
Implementing and Operating Cisco Security Core Technologies
This course will help you prepare to take the Implementing and Operating Cisco Security Core Technologies (350-701 SCOR) exam. This exam tests a candidate's knowledge of implementing and operating core security ...
Microsoft Identity and Access Administrator
In this Microsoft Certified: Identity and Access Administrator Associate course, you’ll learn to design, implement and operate your business' identity and access management system by using Azure AD.
Implementing and Operating Cisco Collab. Core Technologies
The Implementing Cisco Collaboration Core Technologies (CLCOR) v1.0 course helps you prepare for the Cisco® CCNP® Collaboration and CCIE® Collaboration certifications, and advanced-level roles focused on ...
Implementing and Configuring Cisco Identity Serv. Engine
This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP® Security and the Cisco Certified Specialist - Security Identity ...
Securing Networks with Cisco Firepower Next Gen. Firewall
This class will help you: Implement Cisco Firepower NGFW to provide advanced threat protection before, during, and after attacks Gain leading-edge skills for high-demand responsibilities focused on security Earn 40 ...
Understanding Cisco Collaboration Foundations
After taking this course, you should be able to: Define collaboration and describe the main purpose of key devices in a Cisco collaboration on- premise, hybrid, and cloud deployment model Configure and modify ...
Microsoft Azure SecurityTechnologies
This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities.
Securing Email with Cisco Email Security Appliance v3.1
This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA), which leads to CCNP® Security and the Certified Specialist - Email Content Security certifications.
Implementing Cisco Collaboration Applications
After taking this course, you should be able to: Configure Cisco Unity Connection integration Configure and troubleshoot Cisco Unity Connection and Cisco Unity Connection call handlers Configure and troubleshoot ...
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention ...
Securing the Web with Cisco Web Security Appliance
This course helps you prepare to take the exam, Securing the Web with Cisco Web Security Appliance (300-725 SWSA), which leads to CCNP® Security and the Cisco Certified Specialist - Web Content Security.
Implementing Secure Solutions with Virtual Private Networks
In this training, participants will learn how to secure data that goes through a network infrastructure by implementing a VPN solution built on Cisco products. Participants will gain experience in configuring ...