Course Code: 1290
The intensive, hands-on Red Hat® Enterprise Clustering and Storage Management course covers storage management, the Red Hat High Availability Add-On, and the shared storage technology delivered by Red Hat Global File System 2 (GFS2) and Red Hat Storage Server.
Course Code: 821294
Vulnerability Response essentials covers why customers need Vulnerability Response, what Vulnerability Response is, and how to properly implement it.
Course Code: 100504
Learn to use Cisco Unified Communications Manager features to consolidate your communications infrastructure into a scalable, portable, and secure collaboration solution.
Course Code: 821670
In addition, you learn how to optionally pin an agent to a specific version in case that is ever needed. You learn how to install agents on various platforms, such as a Docker, directly to the host, YAML, Operator, and Helm chart. This course also describes how to co...
Course Code: 100494
SCOR - Implementing and Operating Cisco Security Core Technologies v1.0 helps you prepare for the CCNP Security and CCIE Security certifications. Enroll today!
Course Code: 100489
Master design and deployment options focused on Cisco data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security.
Course Code: 100527
CCNA-Implementing and Administering Cisco Solutions Boot Camp teaches professionals how to install, operate, configure and verify a basic IPv4 and IPv6 network.
Course Code: 100837
Want to advance your career? Learn the foundational knowledge & skills necessary to install, configure, and operate a small to medium-sized Cisco network.
Course Code: 1274
The RHCSA Rapid Track course (RH199) is for individuals who already have significant experience with Linux administration and would like to learn more about Red Hat Enterprise Linux 8. Enroll in the RHCSA Training course at Global Knowledge.
Course Code: 5827
Learn to analyze, exploit packet captures, and put the rule writing theories learned to work by implementing rule-language features for triggering alerts on the offending network traffic.