Course Code: 101000
Build AI infused applications that leverage Azure Cognitive Services, Azure Cognitive Search, and Microsoft Bot Framework.
Course Code: 821338
Exclusive – Exclusive - This course will provide you with a broad introduction to the finance and operations capabilities of Dynamics 365. (MB-920T00).
Course Code: 834084
Course Code: 860043
The Enhancing Cisco Security Solutions with Data Analytics (ECSS) training covers intermediate-level knowledge of Splunk, including its fundamentals, key components, and architecture so you can detect, investigate, and respond to security threats effectively. You’ll...
Course Code: 821612
What is machine learning, and what kinds of problems can it solve? What are the five phases of converting a candidate use case to be driven by machine learning, and why is it important that the phases not be skipped? Why are neural networks so popular now? How can yo...
Course Code: 860025
The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting training that introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious,...
Course Code: 111229
High performing organizations use automated testing to achieve greater productivity and reliability. Every change and new feature are instantly checked to see if it meets intended requirements and doesn’t break the rest of your systems. Today every software team face...
Course Code: 1974
JavaScript is a core technology that supports modern web development creation and design. In this course, you will thoroughly explore writing JavaScript and learning techniques and best practices for using it with today's systems and architectures, enabling you to...
Course Code: 7012
Navigate the move from Citrix Virtual Apps and Desktops 7.1x on-premises to Citrix Virtual Apps and Desktops Service on Citrix Cloud with our training.
Course Code: 100034
IBM® Security QRadar® enables you to minimize the time gap between when a suspicious activity occurs and when you detect it.