Technology Cancel filter
Microsoft 365 Fundamentals
" Differentiate between the various cloud service models. " Identify the key differences between Microsoft 365 and Office 365. " Plan for migration to Microsoft 365 services.
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort email security appliances to successfully manage and troubleshoot email traffic entering and leaving the enterprise ...
Microsoft Security, Compliance, and Identity Fundamentals
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Implementing and Operating Cisco Security Core Technologies
Implementing and Oper. Enterprise Network Core Technologies
Firewall: Configuration and Management (EDU-210)
Goals The Palo Alto Networks Firewall 10.2 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo ...
Microsoft Security Operations Analyst
About This Course Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to ...
Microsoft Identity and Access Administrator
In this Microsoft Certified: Identity and Access Administrator Associate course, you’ll learn to design, implement and operate your business' identity and access management system by using Azure AD.
Implementing Secure Solutions with Virtual Private Networks
In this training, participants will learn how to secure data that goes through a network infrastructure by implementing a VPN solution built on Cisco products. Participants will gain experience in configuring ...