L1 (Foundation) TOGAF® 10
The course is focused on detail explanation of TOGAF - the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Windows Server Hybrid Administrator Associate
This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage ...
Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0
The Implementing Cisco SD-WAN Solutions (ENSDWI) v2.0 course gives you training about how to design, deploy, configure, and manage your Cisco ® Software-Defined WAN (SD-WAN) solution in a large-scale live network, ...
Implementing and Administering Cisco Solutions
This course gives you basic theory and practical knowledge of computer networks built on IPv4 and IPv6 protocols and provides a solid technical background for follow-up Cisco courses in all fields of technology.
L1 (Foundation) ArchiMate 3.2
The course guides you through the ArchiMate modeling language - standard for Enterprise architecture explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
Configuring Cisco Unified Computing System
The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System (Cisco UCS) B-series blade servers, Cisco UCS C-Series, and S-Series ...
Fundamental of Cisco Firewall Threath Def. and Intrus. Prev.
This course SFWIPF (Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention) is an updated version of the SSNGFW course. The goal of this course is to provide you with a solid foundation in Firepower ...
Implementing and Oper. Enterprise Network Core Technologies
After taking this course, you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and ...
TRN_SISE
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
Microsoft Power Platform Developer
The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes. In this course, students will learn how to build Power Apps, ...
Implementing Cisco Application Centric Infrastructure
In this training, participants will learn how to deploy and manage the Cisco Nexus 9000 series switches in Cisco ACI (Application Centric Infrastructure) mode. The course gives you the knowledge and skills to ...
TRN_DCMDS
The Configuring Cisco MDS 9000 Series Switches (DCMDS) v3.1 course shows you how to implement, manage, and troubleshoot Cisco® MDS 9000 Series Switches, to build highly available, scalable storage networks.
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention ...