Course Code: 821294
Vulnerability Response essentials covers why customers need Vulnerability Response, what Vulnerability Response is, and how to properly implement it.
Course Code: 821478
Welcome to the first part of our Microsoft 365 PowerPoint courseware. PowerPoint is Microsoft’s powerful and easy-to-use presentation program. This version of PowerPoint incorporates some new features in an effort to make collaboration and production as easy as possi...
Course Code: 821584
The ITIL 4 Specialist: Sustainability in Digital & IT module is for anyone looking to understand the role that IT and digitally enabled services have in relation to the environment, whilst exploring opportunities to positively impact it. Based on the ITIL 4 frame...
Course Code: 821600
The PowerScale Administration course prepares students to implement, configure and administer the Dell Technologies PowerScale NAS Solution. Topics include an overview of hardware, the configuration and verification of basic and advanced networking, authentication, i...
Course Code: 821605
This course explains and demonstrates the deployment, configuration, and integration of Dell Technologies PowerProtect Data Manager with Microsoft Exchange, Microsoft SQL, Kubernetes, Oracle, SAP HANA, and VMware virtual machines. It describes various databases backu...
Course Code: 821606
Students learn key terms and concepts, use cases, and key features and functionalities. The course provides the knowledge and skills for configuring, managing, and maintaining the DP series appliances. Respective backup and restore configurations are created for diff...
Course Code: 821669
You learn the architecture of Instana and how the data flows from the sensors and tracers, through the agents, and to the big data backend. You learn essential user interface techniques and how to create application perspectives and to use their dashboards to monitor...
Course Code: 821698
Cisco Full-Stack Observability gives you a unified view of resource allocation, infrastructure, and security, allowing you to fine-tune an application ecosystem to deliver the best possible application experience while keeping key performance indicators (KPI) in thes...
Course Code: 833001
This course covers the concepts, features, management, design and troubleshooting of PowerProtect Cyber Recovery and CyberSense solutions. The course contains security considerations as well as the steps to manage storage, applications and policies, copies, sandboxes...
Course Code: 899014
In this course you will learn how to translate various concepts in Teradata to the analogous concepts in BigQuery. You will learn how the high-level architectures of Teradata and BigQuery compare, understand di erences in how to con gure datasets and tables, map data...