Course Code: 4935
Enroll in Certified Network Defender (CND) training and work towards your CND certification in cybersecurity. Learn about hackers and cyber defense strategies required in today's critical infrastructure. Enroll with Global Knowledge today.
Course Code: 111223
Gain hands-on practice in Iteration Planning, Product Roadmap and Backlog, Estimating Practices, User Story Development and Iteration Execution for Non-Software applications.
Course Code: 2712
Learn how to utilize use case modeling to document functional requirements that can be understood and validated by all project stakeholders, including technical staff and business stakeholders, increasing the likelihood that stakeholder needs on a project are met.
Course Code: 2711
Get hands-on practice modeling requirements through entity relationship diagrams, supertypes and subtypes, and attributive and associative entities. Learn to use logical data modeling to work directly with business users to accurately define requirements.
Course Code: 4518
Exclusive – Go beyond brainstorming and discover how to properly lead all types of innovation using the right leadership skills and behaviors.
Course Code: 100927
New – Want to learn tools of business finance? Join our 1-day course to examine financial statements, income statements & statement of stockholders' equity.
Course Code: 100928
New – This course will give you more confidence in your ability to handle problems as they arise, and be able to assess the impact of possible solutions.
Course Code: 100959
New – Prevent stress from taking over. This live class helps participants to recognize stress, how we place pressure on ourselves, and how to prevent it.
Course Code: 100961
New – Do you lack confidence in expressing your ideas? Join our course to learn how to ask for what you need, handle confrontations, and put your ideas forward.
Course Code: 834034
Get started with Microsoft Sentinel security operations by configuring the Microsoft Sentinel workspace, connecting Microsoft services and Windows security events to Microsoft Sentinel, configuring Microsoft Sentinel analytics rules, and responding to threats with au...