Course Code: 101000
Build AI infused applications that leverage Azure Cognitive Services, Azure Cognitive Search, and Microsoft Bot Framework.
Course Code: 860011
Cisco U. not only brings together the depth of industry-leading certification, product, and role-based training that our learners have come to know and trust, including AppDynamics and Meraki, but also includes training from other adjacent technologies and learning p...
Course
The GK Polaris subscription program delivers unlimited access to Virtual Classroom Live training. Included are courses and certification prep for the most in-demand AWS cloud topics, such as administration, architecture, operations and security.
Related Page
Here's a data profile on the types of IT professionals who hold the Palo Alto Networks Certified Network Security Administrator certification.
Course
The GK Polaris subscription program provides three unlimited training options. The Discovery subscription includes over 200 live virtual courses.
Course Code: 821577
During their five days in the classroom, students review the basics of C# program structure, language syntax, and implementation details, and then consolidate their knowledge throughout the week as they build an application that incorporates several features of .NET....
Course Code: 6544
Learn to build reusable tools with Windows PowerShell 3.0 and focus on the Windows PowerShell scripting language. Understand the concepts and techniques needed to design tools, including input, output and functional requirements. Enroll now in M55039 at Global Knowledge.
A look at five basics to consider in any data center virtualization project: planning, balancing the various hardware components, sizing the storage properly, managing capacity, and automation.
Examine 15 common myths surrounding virtualization from a vendor-neutral viewpoint.
Course Code: 840103
Exclusive – Cybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, a key component in modern cybersecurity strategies. Participants will learn to identify, analyze, and mitigate potential security threats in complex systems. The course...