248 Results Found
Whether you’re a current cyber pro looking to specialize, or new to the industry and looking for direction, Focal Point Academy’s lead cyber workforce expert can give you the insight needed to fast-track a career into today’s most in-demand cyber jobs, like Threat Hunting and Reverse Engineering. We’ll profile the top job roles for the next few years, break down the knowledge, skills, and abilities required in each, and show you how to build a training plan that gets you the job you want. And best of all, we’ll end with a special offer designed to help jump start the process for you and your team. View the slide deck>
Microsoft is retiring the MCSA and MCSE certifications January 31st, 2021. Does that really mean it is the end? It isn’t.Join this webinar to understand the logical next steps and new certification paths. View the slide deck>
The purpose of this workshop is to demonstrate how administrators can get a secure and scalable instance of Docker Enterprise up and running within 2 hours. Topics include: installation of Docker Enterprise Edition, implementing container best practices, and configuring Kubernetes to support multiple users and applications.
A quick 30 minute introduction to Business Analysis for those who are considering the field. This webinar looks at why the BA is essential to the business, what BAs do, and certification paths for Business Analysts. View the slide deck>
Microsoft is retiring the MCSA and MCSE certifications January 31st, 2021. Does that really mean it is the end? It isn’t.Join this webinar to understand the logical next steps and new certification paths. View the slide deck>
This webinar will examine how to create various services in Azure. We will consider the different ways available to create resources in Azure. View the slide deck>>
Kubernetes automates container management. The process of container orchestration is so complex that trying to manage containers by hand has become impossible. There are many, components to container orchestration, but one of the most misunderstood is networking. In this 1-hour webinar we’ll explore how k8s actually performs IP networking and service discovery, two of the most critical components for successfully delivering microservices. We’ll examine how kubernetes carries the burden of cloud networking and lastly what it takes to pass the CKAD/CKA Certifications.
Using Palo Alto Networks, PAN-OS, enterprises can build an IT Security Platform capable of delivering protection against all stages of the Cyber-Attack Lifecycle. From Reconnaissance to Act on Objective, the PAN-OS Single-Pass Parallel Processing (SP3) engine combines efficient throughput with maximum data protection. This recorded webinar will describe how the SP3 Architecture can increase network traffic visibility and enable you to control your environment. View the slide deck>
Agile is a group of methodologies (including SCRUM, XP, Lean, and Kanban) that values a pragmatic mind-set and a flexible approach. Most, but not all agile methodologies, apply an incremental approach utilizing short work intervals to provide functional results quickly and adjust for the customer’s evolving understanding of the real need. This session will look at the foundation for agile and then take a high-level walk through the agile life cycle.
IT administration tasks have usually required manual, point and click operations. Those days are gone; not only is manual action no longer necessary, but your IT technologists can’t afford the time to manually do what can be easily automated and taken off their plate. PowerShell provides an intuitive way to turn time-consuming grunt work into simple, repeatable, scriptable commands. Is your organization taking advantage of PowerShell? Your competitors are. View the slide deck>