VMware NSX: Install,Configure, Manage [V4.0]
This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment. This course covers key features and functionality offered in the NSX 4.
VMware vSphere: Install, Configure, Manage 8
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi™ 8 and VMware vCenter® 8.
Implementing and Operating Cisco DC Core Technologies
The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.0 course helps you prepare for the Cisco® CCNP® Data Center and CCIE® Data Center certifications and for advanced-level data center roles.
VMware vSphere: Install, Configure, Manage [V8]
CompTIA Security+
Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI .
AWS Technical Essentials
In this course, you will learn: Terminology and concepts related to the AWS platform How to navigate the AWS Management Console Key concepts of AWS security measures and AWS Identity and Access Management ...
AZ-900T0-A: MSAzureFundamentals
About This Course This two-day course will provide foundational level knowledge on cloud concepts; core Azure services; security, privacy, compliance, and trust; and Azure pricing and support.
Developing iRules for BIG-IP
This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. This three-day course provides ...
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
CompTIA Cybersecurity Analyst - CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments. Analyze the cybersecurity threat landscape. Analyze reconnaissance threats to ...