Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Technology Cancel filter
Location Cancel filter
Language
Difficulty
Aria Automation: Install, Configure, Manage
During this five-day course, you focus on installing, configuring, and managing VMware Aria Automation 8.10™ on-premises systems. You learn how it can be used to automate the delivery of virtual machines, ...
Firewall: Configuration and Management (EDU-210)
The Palo Alto Networks Firewall 10.0 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto ...
Microsoft Security, Compliance, and Identity Fundamentals
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions..
TRN_SESA
At the end of the course, attendees will possess a working knowledge of how to use Cisco IronPort email security appliances to successfully manage and troubleshoot email traffic entering and leaving the enterprise ...
Panorama: Managing Firewalls at Scale (EDU-220)
The Palo Alto Networks Panorama: Managing Firewalls at Scale (EDU-220) course is an instructor-led training that will help you to: Learn how to design, configure and manage the Panorama FireWall management ...
VMware vSAN: Install, Configure, Manage V8
During this four-day course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster. You will learn about managing and operating vSAN. This course focuses on building the required ...
VMware vSphere with Tanzu: Deploy, Configure, Manage [V8]
During this three-day course, you focus on deploying and managing VMware vSphere® with VMware Tanzu® in a VMware vSphere® 8 environment. You learn how vSphere with Tanzu provides services to deploy and manage virtual ...
CompTIA Cybersecurity Analyst- CySA+
After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing ...