Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

279 Results Found for "azure"

Results per page: 10 40 80

Cybersecurity Glossary of Terms

Related Page

The Cybersecurity Glossary of Terms contains definitions to help you uncover knowledge areas in which you excel and where you want to expand. Read here.

The Role of Critical Thinking in Problem Analysis

White Paper | Oct. 13, 2020

Learn how to develop a questioning outlook and quality standards that will help you make more effective decisions.

Security Engineering on AWS

Course Code: 3338

Learn how to efficiently use Amazon Web Services (AWS) Security Services and the best practices for optimal security and compliance within the AWS Cloud.

Delivery Formats

IT Service Management (ITSM) Fundamentals

Course Code: 821276

This course provides general information on ITSM supporting applications, such as Configuration Management, Knowledge Management, ITSM Professional applications.

Delivery Formats

Microsoft Windows Automation with Red Hat Ansible Automation Platform (DO417)

Course Code: 100702

NewMicrosoft Windows Automation with Red Hat Ansible (DO417) is designed for Windows Server professionals without previous Ansible experience.

Delivery Formats

Cisco Identity Services Engine (ISE)

Related Page

Cisco Identity Services Engine is an access control policy platform that enhances infrastructure security. Learn about training and certification today.

Technology Offers Convenience, Privacy Pays the Price

White Paper | Sep. 25, 2015

Free websites and apps track your personal data; find tips to protect yourself online.

AMA2235 Building Better Work Relationships: New Techniques for Results-oriented Communication

Course Code: 2682

In today's volatile and challenging business environment, you have to build successful work relationships and interact with people in a positive way to achieve your organizational goals. Now, discover the basic competencies critical to solid work relationships-and ca...

Delivery Formats

Stop Gathering Requirements and Start Building Them

White Paper | June 19, 2015

Discover how the fundamental elements of a requirement give rise to its intrinsic value. Understanding the very nature of those elements is essential to eliciting, planning, analyzing, communicating, and managing them.

10 Ways Malicious Code Reaches Your Private Network

White Paper | July 13, 2010

Learn 10 common ways that malicious code can penetrate your network.