L1 (Foundation) TOGAF® 10
The course is focused on detail explanation of TOGAF - the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
Implementing and Administering Cisco Solutions
This course gives you basic theory and practical knowledge of computer networks built on IPv4 and IPv6 protocols and provides a solid technical background for follow-up Cisco courses in all fields of technology.
L1 (Foundation) ArchiMate 3.2
The course guides you through the ArchiMate modeling language - standard for Enterprise architecture explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
Cisco Unified Collaboration - Advanced Configuration
The seminar is designed for participants who completed seminars COLLAB 1 and VOICE1 and want to expand the knowledge gained from these seminars. The objective of this five day seminar is to update the participants ...
Configuring Cisco Unified Computing System
The Configuring Cisco Unified Computing System (DCCUCS) v1.0 shows you how to deploy, secure, operate, and maintain Cisco Unified Computing System (Cisco UCS) B-series blade servers, Cisco UCS C-Series, and S-Series ...
TRN_F5_LTMC
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.
Fundamental of Cisco Firewall Threath Def. and Intrus. Prev.
This course SFWIPF (Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention) is an updated version of the SSNGFW course. The goal of this course is to provide you with a solid foundation in Firepower ...
Implementing and Oper. Enterprise Network Core Technologies
After taking this course, you should be able to: Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers Compare and contrast the various hardware and ...
TRN_SISE
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that ...
TRN_VM_VSWN8
This hands-on training course explores new features in VMware vCenter Server™ 5.0 and VMware ESXi™ 5.0. Topics include VMware vSphere® 5 installation and how to upgrade from vSphere 4.
Microsoft Power Platform Developer
The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes. In this course, students will learn how to build Power Apps, ...
Veeam Availability Suite v11: Configuration and Management
After completing this course, attendees should be able to: Describe Veeam security concepts Given a scenario, configure a backup job and a backup copy job Explain network-attached storage (NAS) backups and ...