Microsoft 365 Administrator Essentials
This course covers the following key elements of Microsoft 365 administration: Microsoft 365 tenant management, Microsoft 365 identity synchronization, and Microsoft 365 security and compliance.
Implementing Cisco Application Centric Infrastructure Advanc
In this training, we will teach participants how to take advantage of the capabilities of Cisco Nexus 9000 switches in Cisco ACI (Application Centric Infrastructure) mode. Participants will learn how to configure and ...
Implementing and Operating Cisco Collab. Core Technologies
The Implementing Cisco Collaboration Core Technologies (CLCOR) v1.0 course helps you prepare for the Cisco® CCNP® Collaboration and CCIE® Collaboration certifications, and advanced-level roles focused on ...
Implementing Cisco Collaboration Applications
After taking this course, you should be able to: Configure Cisco Unity Connection integration Configure and troubleshoot Cisco Unity Connection and Cisco Unity Connection call handlers Configure and troubleshoot ...
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...
VMware vSphere: Install, Configure, Manage [V8]
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to ...
Implementing Automation for Cisco Collaboration Solutions
The Implementing Automation for Cisco Collaboration Solutions (CLAUI) v1.0 course teaches you how to implement Cisco® Collaboration automated, programmable solutions for voice, video, collaboration, and conferencing ...
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...
Cyber Attack and Defense in Practice
After completion of the course, students will be able to: Perform basic security test Detect most common web application vulnerabilities Perform social engineering penetration test Analyze e-mail headers Analyze ...