Veeam Availability Suite v11: Configuration and Management
After completing this course, attendees should be able to: Describe Veeam security concepts Given a scenario, configure a backup job and a backup copy job Explain network-attached storage (NAS) backups and ...
Open Agile Architecture
Open Agile Architecture (O-AA) is a brand new standard published by The Open Group in the second half of 2020. It contains a lot of useful techniques for agile and digital transformation of the architecture of the ...
TRN_DCID
The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco® data center solutions and technologies across network, compute, virtualization, ...
Implementing Cisco Enterprise Wireless Networks
The Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.0 course gives you the knowledge and skills needed to secure wireless network infrastructure and troubleshoot any related issues.
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
Microsoft 365 - Teams Administrator Associate
In this course, you will learn how to manage Microsoft Teams in your organizations. The course covers Microsoft Teams overview, implementing governance, security and compliance for Microsoft Teams, preparing the ...
Designing Cisco Enterprise Networks
The Designing Cisco Enterprise Networks (ENSLD) v1.0 course gives you the knowledge and skills you need to design an enterprise network. This course serves as a deep dive into enterprise network design and expands on ...
L1 (Foundation) TOGAF® 10
The course is focused on detail explanation of TOGAF - the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
Microsoft Identity and Access Administrator
This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and it ...
Microsoft Security, Compliance, and Identity Fundamentals
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions..
Implementing and Administering Cisco Solutions
This course gives you basic theory and practical knowledge of computer networks built on IPv4 and IPv6 protocols and provides a solid technical background for follow-up Cisco courses in all fields of technology.
L1 (Foundation) ArchiMate 3.2
The course guides you through the ArchiMate modeling language - standard for Enterprise architecture explaining usage of all elements, relationships and other concepts using real examples from multiple industries.