Sort by
Filter
Online / Onsite Cancel filter
Guaranteed term
Vendor Cancel filter
Technology Cancel filter
Language
Difficulty
Basics of Data ONTAP C-Mode Administration
Goal of this course is to teach basic administration of clustered Data ONTAP, using lectures and hands-on exercises. Students will configure and manage a Data ONTAP cluster so after course they will be able manage ...
Certified Ethical Hacker v11
Certified Ethical Hacker v11 is the latest version of the world's most popular and most prestigious EC-Council training. Students have the unique opportunity to become familiar with the strategies, techniques and ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
VMware vSphere: Install, Configure, Manage [V7]
Describe the software-defined data center Deploy an ESXi host and create virtual machines Describe vCenter Server architecture Deploy a vCenter Server instance or VMware vCenter Server™ Appliance™ Use vCenter ...
VMware Horizon Mirage: Install, Configure, Manage
Install and configure Horizon Mirage components. Demonstrate how to navigate and use Horizon Mirage Management Console. Identify the process for deploying Horizon Mirage to endpoints.
vCenter Site Recovery Manager: Install, Configure, Manage
This two-day, hands-on training course gives experienced VMware vSphere® administrators the knowledge to install, configure, and manage VMware Site Recovery Manager™ 8.2. This course also shows you how to write and ...
L1 (Foundation) for ArchiMate 3.1
The course guides you through the ArchiMate modeling language – standard for Enterprise architecture – explaining usage of all elements, relationships and other concepts using real examples from multiple industries.
TRN_SO_VYJ
You'll participate in 4 practical negotiation simulations and you'll receive feedback from your colleagues and an acknowledged negotiation expert. You'll see short films of negotiators and you'll learn from their ...
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Certified Information Systems Security Professional
If you are working or involved in cybersecurity or information governance, it is now time to take your experience to the next level. This course is ideal for individuals with security responsibilities, such as: ...
Open Agile Architecture
Open Agile Architecture (O-AA) is a brand new standard published by The Open Group in the second half of 2020. It contains a lot of useful techniques for agile and digital transformation of the architecture of the ...
Cortex XDR: Prevention, Analysis, and Response (EDU-260)
Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console, including reporting Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex ...
Power Platform Fundamentals
Learn the business value and product capabilities of Microsoft Power Platform. Create simple Power Apps, connect data with Dataverse, build a Power BI Dashboard, automate processes with Power Automate, and build a ...