Sort by
Filter
Online / Onsite
Technology Cancel filter
Location Cancel filter
Difficulty Cancel filter
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention ...
Microsoft 365 - Developer Associate
This course covers five central elements of Microsoft 365 platform – implementing Microsoft Identity, working with Microsoft Graph, extending and customizing SharePoint, extending Teams, and extending Office.
SIP deep dive
In today's Unified Communications networks, SIP protocol is used whether for communication between endpoints, but also between different server systems. In this course, the participants will 'dive' into theoretical ...
Implementing Videoconferencing in the Unified Collaboration
The seminar is designed for participants who have completed a seminar COLLAB 1. The objective of this four day seminar is to update the participants how to properly proceed in the implementation and administration of ...
Basics of Cisco Unified Collaboration implementation
The seminar is designed for participants who want to familiarize deeper with the Collaboration technology, mainly focused on the basic principles of operation and implementation of voice and video calls.
TRN_DCACIA
In this training, we will teach participants how to take advantage of the capabilities of Cisco Nexus 9000 switches in Cisco ACI (Application Centric Infrastructure) mode. Participants will learn how to configure and ...
TRN_DCIT
The Troubleshooting Cisco Data Center Infrastructure (DCIT) v7.0 course shows you how to troubleshoot LAN, SAN, Cisco® Data Center Unified Fabric, Cisco Unified Computing System™ (Cisco UCS®), and Cisco ...
Advanced administration of CUCM and signaling protocols
By completion of this course participant will understand the internal processes of voice gateway, will be able to analyze calls passing through the voice gateway, which is necessary to implement, operate and possibly ...
VMware vSphere: Design
This three-day course equips you with the knowledge, skills, and abilities to design a VMware vSphere 8 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures ...
CompTIA Cybersecurity Analyst- CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...