Sortare dupa
Filter
Online / Onsite Anulează filtru
Termen garantat
Furnizor
Tehnologie Anulează filtru
Localitate
Dificultate
Configuring BIG-IP Local Traffic Manager
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Microsoft 365 Administrator
This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance.
Designing Microsoft AzureInfrastructure Solutions
After completing this course, students will be able to: Design a governance solution. Design a compute solution. Design an application architecture. Design storage, non-relational and relational.
Introducing Cisco Unified Computing System v1.0
Describe Cisco UCS server hardware Describe Cisco UCS connectivity Describe the Cisco HyperFlex Data Platform, its data writing and reading processes, and data optimization Describe and configure Cisco UCS service ...
Understanding Cisco Data Center Foundations
The Understanding Cisco Data Center Foundations (DCFNDU) v1.0 course helps you prepare for entry- level data center roles. In this course, you will learn the foundational knowledge and skills you need to configure ...
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Microsoft Power PlatformFundamentals
At Course Completion After completing this course, students will be able to: Describe Microsoft Power Platform components Describe Microsoft Dataverse and connectors Describe cross-cloud scenarios across M365, ...
Security Engineering on AWS
In this course, you will learn how to: Assimilate and leverage the AWS shared security responsibility model Architect and build AWS application infrastructures that are protected against the most common security ...