Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Technology
Location
Language Cancel filter
Difficulty
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
Microsoft 365 - Teams Administrator Associate
In this course, you will learn how to manage Microsoft Teams in your organizations. The course covers Microsoft Teams overview, implementing governance, security and compliance for Microsoft Teams, preparing the ...
Designing Cisco Enterprise Networks
The Designing Cisco Enterprise Networks (ENSLD) v1.0 course gives you the knowledge and skills you need to design an enterprise network. This course serves as a deep dive into enterprise network design and expands on ...
Windows Server Hybrid Administrator Associate
This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage ...
Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0
The Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0 course gives you training about how to design, deploy, configure, and manage your Cisco ® Software-Defined WAN (SD-WAN) solution in a large-scale live network, ...
Implementing and Administering Cisco Solutions
This course gives you basic theory and practical knowledge of computer networks built on IPv4 and IPv6 protocols and provides a solid technical background for follow-up Cisco courses in all fields of technology.
TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
Configuring Cisco Unified Computing System
The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System (Cisco UCS) B-series blade servers, Cisco UCS C-Series, and S-Series ...
TRN_F5_LTMC
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Fundamental of Cisco Firewall Threath Def. and Intrus. Prev.
This course SFWIPF (Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention) is an updated version of the SSNGFW course. The goal of this course is to provide you with a solid foundation in Firepower ...
Implementing and Oper. Enterprise Network Core Technologies
After taking this course, you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and ...
TRN_SISE
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
Microsoft Power Platform Developer
The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes. In this course, students will learn how to build Power Apps, ...