Sort by
Filter
Online / Onsite
Vendor
Technology Cancel filter
Location Cancel filter
Difficulty Cancel filter
TRN_DC-N91
This instructor-led training is designed for technical professionals who have responsibilities installing, configuring, and operating Nexus 9500/9300 and Nexus 2000 in data center environment.
TRN_DCID
The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco® data center solutions and technologies across network, compute, virtualization, ...
Configuring Cisco Unified Computing System
The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System (Cisco UCS) B-series blade servers, Cisco UCS C-Series, and S-Series ...
TRN_VM_VSWN8
This hands-on training course explores new features in VMware vCenter Server™ 5.0 and VMware ESXi™ 5.0. Topics include VMware vSphere® 5 installation and how to upgrade from vSphere 4.
TRN_DCMDS
The Configuring Cisco MDS 9000 Series Switches (DCMDS) v3.1 course shows you how to implement, manage, and troubleshoot Cisco® MDS 9000 Series Switches, to build highly available, scalable storage networks.
Implementing Cisco Application Centric Infrastructure
In this training, participants will learn how to deploy and manage the Cisco Nexus 9000 series switches in Cisco ACI (Application Centric Infrastructure) mode. The course gives you the knowledge and skills to ...
TRN_DCIT
The Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 course shows you how to troubleshoot LAN, SAN, Cisco® Data Center Unified Fabric, Cisco Unified Computing System™ (Cisco UCS®), and Cisco ...
VMware vSphere: Design
This three-day course equips you with the knowledge, skills, and abilities to design a VMware vSphere 8 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures ...
CompTIA Cybersecurity Analyst- CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...