Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor
Technology Cancel filter
Location
Difficulty
Microsoft 365 - Fundamentals
This course provides foundational knowledge on the considerations and benefits of adopting cloud services and the Software as a Service (SaaS) cloud model, with a specific focus on Microsoft 365 cloud service offerings.
TRN_SWSA
The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for ...
ASA Firewall
This is a basic Cisco ASA firewall configuration course. This five-day course will prepare network security engineers for the basic skills and knowledge needed to configure Cisco ASA firewalls.
Implementing Secure Solutions with Virtual Private Networks
In this training, participants will learn how to secure data that goes through a network infrastructure by implementing a VPN solution built on Cisco products. Participants will gain experience in configuring ...
Veeam Availability Suite v11: Configuration and Management
After completing this course, attendees should be able to: Describe Veeam security concepts Given a scenario, configure a backup job and a backup copy job Explain network-attached storage (NAS) backups and ...
Open Agile Architecture
Open Agile Architecture (O-AA) is a brand new standard published by The Open Group in the second half of 2020. It contains a lot of useful techniques for agile and digital transformation of the architecture of the ...
TRN_OTH_CEH
Certified Ethical Hacker v12 is the latest version of the world's most popular and most prestigious EC-Council training. The CEHv12 training is the best training for advanced administrators and future penetration ...
Microsoft 365 - Teams Administrator Associate
In this course, you will learn how to manage Microsoft Teams in your organizations. The course covers Microsoft Teams overview, implementing governance, security and compliance for Microsoft Teams, preparing the ...
L1 (Foundation) TOGAF® 10
The course is focused on detail explanation of TOGAF - the international standard for enterprise architecture management. It defines and explains processes for the design and management of the architecture (TOGAF ...
Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies.
L1 (Foundation) ArchiMate 3.2
The course guides you through the ArchiMate modeling language - standard for Enterprise architecture explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
TRN_COMPTIA_SEC
Objectives of training: The course will introduce participants to several cyber security domains, both organizational and technical in nature, and will provide them with knowledge necessary for succeeding in the ...
Fundamental of Cisco Firewall Threath Def. and Intrus. Prev.
This course SFWIPF (Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention) is an updated version of the SSNGFW course. The goal of this course is to provide you with a solid foundation in Firepower ...