Implementing Secure Solutions with Virtual Private Networks
In this training, participants will learn how to secure data that goes through a network infrastructure by implementing a VPN solution built on Cisco products. Participants will gain experience in configuring ...
TRN_DCID
The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco® data center solutions and technologies across network, compute, virtualization, ...
Implementing Cisco Enterprise Wireless Networks
The Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.0 course gives you the knowledge and skills needed to secure wireless network infrastructure and troubleshoot any related issues.
VMware Horizon 8: Deploy and Manage
This five-day course gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware ...
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
Microsoft 365 - Teams Administrator Associate
In this course, you will learn how to manage Microsoft Teams in your organizations. The course covers Microsoft Teams overview, implementing governance, security and compliance for Microsoft Teams, preparing the ...
Designing Cisco Enterprise Networks
The Designing Cisco Enterprise Networks (ENSLD) v1.0 course gives you the knowledge and skills you need to design an enterprise network. This course serves as a deep dive into enterprise network design and expands on ...
Windows Server Hybrid Administrator Associate
This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage ...
Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
Implementing and Administering Cisco Solutions
This course gives you basic theory and practical knowledge of computer networks built on IPv4 and IPv6 protocols and provides a solid technical background for follow-up Cisco courses in all fields of technology.
TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
Configuring Cisco Unified Computing System
The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System (Cisco UCS) B-series blade servers, Cisco UCS C-Series, and S-Series ...
VMware NSX: Install,Configure, Manage [V4.0]
This five-day intensive course provides comprehensive training for installing, configuring and managing VMware NSX® environments. This course covers the key features and functionality offered in NSX 4.
VMware vSphere: Operate, Scale and Secure [V8]
This five-day course will teach you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a combination of lectures and hands-on exercises, you will configure ...