Microsoft Security Operations Analyst
About This Course Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to ...
Microsoft Identity and Access Administrator
In this Microsoft Certified: Identity and Access Administrator Associate course, you’ll learn to design, implement and operate your business' identity and access management system by using Azure AD.
Microsoft Security, Compliance, and Identity Fundamentals
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Microsoft Power Platform Fundamentals
At Course Completion After completing this course, students will be able to: Describe Microsoft Power Platform components Describe Microsoft Dataverse and connectors Describe cross-cloud scenarios across M365, ...
Systems Operations on AWS
In this course, you will learn how to: Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (Amazon VPC), Amazon Elastic Compute Cloud (Amazon EC2), Elastic Load Balancing (ELB), and AWS ...
Advanced Architecting on AWS
Course Objectives In this course, you will learn how to: Apply the AWS Well-Architected Framework Manage multiple AWS accounts for your organization Connect an on-premises datacenter to the AWS Cloud Discuss billing ...
AWS Security Essentials
In this course, you will learn to: Identify security benefits and responsibilities when using the AWS Cloud Describe the access control and management features of AWS Understand the different data encryption methods ...
Architecting on AWS
In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Leverage AWS services to make your infrastructure scalable, reliable, and highly ...
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.