Technology Cancel filter
Implementing and Administering Cisco Solutions
The Implementing and Administering Cisco Solutions (CCNA) v1.0 course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will ...
Implementing Cisco Application Centric Infrastructure
This course will help you: Gain skills and hands-on practice implementing Cisco Nexus 9000 Series Switches in ACI mode Prepare for the Implementing Cisco Application Centric Infrastructure (300-620 DCACI) ...
Microsoft 365 Fundamentals
" Differentiate between the various cloud service models. " Identify the key differences between Microsoft 365 and Office 365. " Plan for migration to Microsoft 365 services.
Implementing and Operating Cisco DC Core Technologies
This course will help you: Gain experience implementing, securing and automating network, compute, and storage infrastructure Gain knowledge and skills through Cisco’s unique combination of lessons and hands-on ...
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
VMware NSX: Install Configure Manage
Describe the evolution of the software-defined data center Describe how NSX is the next step in the evolution of the software-defined data center Describe data center prerequisites for NSX deployment Configure and ...
Microsoft Security Operations Analyst
About This Course Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to ...
Microsoft Security, Compliance, and Identity Fundamentals
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Configuring F5 Advanced WAF
In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.
This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System..
Security Monitoring and Incident Response
This two-day technical course covers basic theoretical and practical aspects of security monitoring, analysis and incident response in modern organizations. Students will learn basics of security monitoring and ...