Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Location
Difficulty
TRN_BGP
This course provides students with in-depth knowledge of BGP, the routing protocol that is one of the underlying foundations of the Internet and new-world technologies such as Multiprotocol Label Switching (MPLS).
Microsoft Cloud 365 Identity and Services
At Course Completion By actively participating in this course, you will learn about the following: Designing, configuring, and managing your Microsoft 365 tenant Microsoft 365 product functionality Configuring ...
Microsoft Cloud 365 Mobility and Security
This three-MOC packaged set aligned to Microsoft 365 Exam: Microsoft 365 Mobility and Security contains courseware that helps prepare students for Exams MS-101. Passing this exam is required to earn the Microsoft 365 ...
MS-500: Microsoft 365 Security Administration
Microsoft 365 Certified: Security Administrator Associate Microsoft 365 Security Administrators proactively secure M365 enterprise and hybrid environments, implement and manage security and compliance solutions, ...
Troubleshooting BIG-IP LTM
This course will provide system and network specialists with knowledge and hands-on experience with the methodology and tools for solving problems associated with BIG-IP LTM system configuration and administration.
Firewall: Configuration and Management (EDU-210)
Successful completion enhances participants’ understanding of how to configure and manage Palo Alto Networks Next-Generation Firewalls. The course includes hands-on experience configuring, managing, and monitoring a ...
Configuring BIG-IP DNS
This three day course gives networking professionals a functional understanding of the BIG-IP® APM system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP APM system.
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security test Detect most common web application vulnerabilities Perform social engineering penetration test Analyze e-mail headers Analyze ...