Course Code: 900019
This IBM Self-Paced Virtual Class (SPVC) includes: PDF course guide available to attendee during and after course Lab environment where students can work through demonstrations and exercises at their own pace IBM Security® Guardium® Data Protection (Guardium) is a...
Course Code: 834045
The first part of the course introduces you to Copilot for Microsoft 365, examines how you can use Copilot throughout the various Microsoft 365 apps, explores best practices for using Copilot and building effective prompts, and examines how you can extend Copilot. Th...
Course Code: 840251
Exclusive – Terraform with Azure offers a thorough framework for utilizing Terraform to efficiently provision, manage, and maintain Azure infrastructure. Participants will gain hands-on experience with Terraform's Infrastructure as Code (IaC) capabilities, enabling them to autom...
Course Code: 100651
Exclusive – Microsoft Dynamics 365 Finance and Operations Apps Developers implement and extend applications to meet the requirements of the business.
Course Code: 821583
Exclusive – Candidates for this course automate time-consuming and repetitive tasks by using Microsoft Power Automate. They review solution requirements, create process documentation, and design, develop, troubleshoot, and evaluate solutions. Candidates work with business stakeh...
Course Code: 7248
The Red Hat Certified Specialist in Deployment and Systems Management exam (EX403) tests candidates' knowledge, skills, and ability to use Red Hat products, including Red Hat® Enterprise Linux® and Red Hat Satellite Server, to deploy and manage systems in an efficient, scalable, replicable, and reliable manner.
Course Code: 840017
Dive into the rapidly evolving world of Machine Learning Operations (MLOps) and AI Security with our intensive 3-day boot camp. MLOps bridges the gap between data science and operation teams, delivering continuous collaboration and integration to drive the efficient...
Course Code: 840103
Exclusive – Cybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, a key component in modern cybersecurity strategies. Participants will learn to identify, analyze, and mitigate potential security threats in complex systems. The course...
Course Code: 821670
In addition, you learn how to optionally pin an agent to a specific version in case that is ever needed. You learn how to install agents on various platforms, such as a Docker, directly to the host, YAML, Operator, and Helm chart. This course also describes how to co...
Course Code: 840101
Exclusive – This course is designed to equip cybersecurity professionals with the essential knowledge and skills required to effectively manage and mitigate cybersecurity incidents. Learn various components and phases of incident response frameworks, explore state-of-the-art too...