Course Code: 100826
Learn about security concepts, network application operations and attacks, Windows and Linux OS, and the data types used to investigate security incidents.
Course Code: 821698
Cisco Full-Stack Observability gives you a unified view of resource allocation, infrastructure, and security, allowing you to fine-tune an application ecosystem to deliver the best possible application experience while keeping key performance indicators (KPI) in thes...
Course Code: 832041
CL270 - Red Hat OpenStack Administration II: Learn to deploy and manage Red Hat OpenStack Services on OpenShift and its external data plan nodes.
Course Code: 0494
This course teaches advanced and additional skills and techniques to programmers who can already write comprehensive RPG IV programs.
Course Code: 899006
In this course, we discuss challenges with data integration and the need for a data integration platform (middleware). We then discuss how Cloud Data Fusion can help to effectively integrate data from a variety of sources and formats and generate insights. We take a...
Course Code: 100672
Learn about machine learning algorithms leveraging Python.
Course Code: 821584
The ITIL 4 Specialist: Sustainability in Digital & IT module is for anyone looking to understand the role that IT and digitally enabled services have in relation to the environment, whilst exploring opportunities to positively impact it. Based on the ITIL 4 frame...
Course Code: 860047
Cisco XDR Security Operations (XDROPS) is a 3-day training guiding you through the main aspects and challenges of traditional SOC. You will learn the Cisco XDR security platform and how it can simplify security operations in today's hybrid, multi-vendor, multi-threat...
Course Code: 847005
This course begins by building a simple RAG pipeline using the NVIDIA API catalog. Participants will deploy and test individual components in a local environment using Docker Compose. Once familiar with the basics, the focus will shift to deploying NIMs, such as LLM,...
Course Code: 840104
The industry-leading Penetration Testing with Kali Linux (PWK/PEN-200) course introduces penetration testing methodology, tools, and techniques in a hands-on, self-paced environment.