Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Technology Cancel filter
Location
Difficulty
Microsoft Identity and Access Administrator
In this Microsoft Certified: Identity and Access Administrator Associate course, you’ll learn to design, implement and operate your business' identity and access management system by using Azure AD.
Designing and Implementing Microsoft DevOps solutions
Administering Relational Databases on Microsoft Azure
Microsoft Security, Compliance, and Identity Fundamentals
The audience for this course is looking to familiarize themselves with the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services.
Microsoft Security Operations Analyst
About This Course Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to ...
Designing Microsoft Azure Infrastructure Solutions
After completing this course, students will be able to: Design a governance solution. Design a compute solution. Design an application architecture. Design storage, non-relational and relational.
Microsoft Power Platform Fundamentals
At Course Completion After completing this course, students will be able to: Describe Microsoft Power Platform components Describe Microsoft Dataverse and connectors Describe cross-cloud scenarios across M365, ...
Microsoft Power BI Data Analyst
Ingest, clean, and transform data Model data for performance and scalability Design and create reports for data analysis Apply and perform advanced report analytics Manage and share report assets.
Systems Operations on AWS
In this course, you will learn how to: Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (Amazon VPC), Amazon Elastic Compute Cloud (Amazon EC2), Elastic Load Balancing (ELB), and AWS ...
CompTIA Security+
Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of ...