Course Code: 6916
New – Gain foundational knowledge of agile service management techniques and scrum development frameworks.
Course Code: 9008
Learn the fundamental capabilities of the Network Installation Management (NIM) facility of the AIX 6 operating system. This course uses a combination of instructor lecture and machine exercises to provide you with practical background knowledge.
Course Code: 100997
Exclusive – This Course helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes.
Course Code: 2486
Full-Spectrum Business Analyst Training & Skills Development: This boot camp arms attendees with the comprehensive skill set needed to attack root causes of project failure such as incomplete, poorly defined and/or changing requirements.
Course Code: 3443
New – Learn to configure Check Point Security Gateway and Management Software Blades, as well as how to build, modify, deploy, & troubleshoot CPS systems on GAiA OS.
Course Code: 101000
Build AI infused applications that leverage Azure Cognitive Services, Azure Cognitive Search, and Microsoft Bot Framework.
Course Code: 821338
Exclusive – Exclusive - This course will provide you with a broad introduction to the finance and operations capabilities of Dynamics 365. (MB-920T00).
Course Code: 111229
High performing organizations use automated testing to achieve greater productivity and reliability. Every change and new feature are instantly checked to see if it meets intended requirements and doesn’t break the rest of your systems. Today every software team face...
Course Code: 821612
What is machine learning, and what kinds of problems can it solve? What are the five phases of converting a candidate use case to be driven by machine learning, and why is it important that the phases not be skipped? Why are neural networks so popular now? How can yo...
Course Code: 860025
The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting training that introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious,...