Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Location
Difficulty
TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
VMware vSphere: Operate, Scale and Secure [V8]
This five-day course will teach you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a combination of lectures and hands-on exercises, you will configure ...
TRN_VM_VSTS8
By the end of the course, you should be able to meet the following objectives: • Introduce troubleshooting principles and procedures • Use command-line interfaces, log files, and the vSphere Client to diagnose and ...
VMware NSX: Install,Configure, Manage [V4.0]
This five-day intensive course provides comprehensive training for installing, configuring and managing VMware NSX® environments. This course covers the key features and functionality offered in NSX 4.
TRN_VMW_VSFT8
This five-day, extended-hour course will take you from basic to advanced knowledge of managing VMware vSphere® 8. Building on the installation and configuration content from our best-selling ICM course, you'll also ...
VMware vSphere: Design
This three-day course equips you with the knowledge, skills, and abilities to design a VMware vSphere 8 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures ...
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
CompTIA CASP+
The course is designed to give participants practical skills and theoretical knowledge necessary to succeed in the CompTIA Advanced Security Practitioner (CASP+) certification exam.
CompTIA Cybersecurity Analyst- CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...
Basics of Data ONTAP C-Mode Administration
Goal of this course is to teach basic administration of clustered Data ONTAP, using lectures and hands-on exercises. Students will configure and manage a Data ONTAP cluster so after course they will be able manage ...
Nutanix Advanced Administration and Perform. Management 5.15
This course features comprehensive coverage of advanced administration and performance management for Nutanix clusters. You’ll learn how to monitor and tune clusters for better system performance, and optimize ...
Nutanix Enterprise Cloud Administration 5.20
The Nutanix Enterprise Cloud Administration (ECA) 5.20 course enables administrators (system, network, and storage) to successfully configure and manage Nutanix in the datacenter. The course covers many of the tasks ...