Course Code: 847005
This course begins by building a simple RAG pipeline using the NVIDIA API catalog. Participants will deploy and test individual components in a local environment using Docker Compose. Once familiar with the basics, the focus will shift to deploying NIMs, such as LLM,...
Course Code: 840104
The industry-leading Penetration Testing with Kali Linux (PWK/PEN-200) course introduces penetration testing methodology, tools, and techniques in a hands-on, self-paced environment.
Course Code: 100502
Implement and deploy core collaboration and networking technologies featuring Cisco Unified Communications Manager.
Course Code: 100879
New – Learn how to install, configure, & maintain a Linux system in a networked environment, with focus on installing and configuring an Ubuntu Linux system.
Course Code: 899006
In this course, we discuss challenges with data integration and the need for a data integration platform (middleware). We then discuss how Cloud Data Fusion can help to effectively integrate data from a variety of sources and formats and generate insights. We take a...
Course Code: 101037
In this course you learn about managing and operating VMware vSAN™ 7.
Course Code: 101132
DCUCAI, Administering Cisco Data Center Unified Computing System with Intersight is a 4-day instructor-led course. In this Cisco UCS server training course, you will become experienced with the administration and troubleshooting of Cisco Unified Computing System (UCS...
Course Code: 1140
Securing Databases: Practical Skills for Safer Systems is an expert-led course designed for database administrators, developers, technical leaders, and stakeholders who are responsible for protecting data in enterprise environments. As organizations place greater rel...
Course Code: 821275
The Human Resources implementation training course provides a best practice approach to configure HR using base instance functionality.
Course Code: 840105
PEN-300 explores advanced penetration testing techniques. Learners gain experience bypassing security defenses and crafting custom exploits in real-world scenarios, enhancing expertise in ethical hacking and vulnerability assessment