Course Code: 834013
This is a 5-day ILT course designed to provide you with the knowledge and skills required to install and configure Windows 11 desktops and devices in an on-premises Windows Server Active Directory domain environment. The skills you gain by attending this course inclu...
Course Code: 834078
Exclusive – In this course, students will learn how to work with key features of Customer Insights – Data and Customer Insights – Journeys. First, students will learn about the business value of using a customer data platform. They will ingest data into Customer Insights – Data,...
Course Code: 821612
What is machine learning, and what kinds of problems can it solve? What are the five phases of converting a candidate use case to be driven by machine learning, and why is it important that the phases not be skipped? Why are neural networks so popular now? How can yo...
Course Code: 860025
The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting training that introduces and guides you to a proactive security search through networks, endpoints, and datasets to hunt for malicious,...
Course Code: 834084
Course Code: 860043
The Enhancing Cisco Security Solutions with Data Analytics (ECSS) training covers intermediate-level knowledge of Splunk, including its fundamentals, key components, and architecture so you can detect, investigate, and respond to security threats effectively. You’ll...
Course Code: 2481
Get guidance on Kanban implementation and bootstrapping a Kanban system in your own organization.
Course Code: 9301
This course is designed to provide you with the skills required to install and customize z/OS UNIX (full name z/OS UNIX System Services), and to manage and monitor the z/OS UNIX environment.
Course Code: 0832
This course is designed to give the z/OS Operator personnel as well as entry systems programmers an overview about JES2. The students should be able to use JES2 commands at the z/OS Console and use SDSF.
Course Code: 5827
Learn to analyze, exploit packet captures, and put the rule writing theories learned to work by implementing rule-language features for triggering alerts on the offending network traffic.