Course Code: 7248
The Red Hat Certified Specialist in Deployment and Systems Management exam (EX403) tests candidates' knowledge, skills, and ability to use Red Hat products, including Red Hat® Enterprise Linux® and Red Hat Satellite Server, to deploy and manage systems in an efficient, scalable, replicable, and reliable manner.
Course Code: 100184
Test your knowledge, skills, and ability to create, configure, and manage Red Hat® Enterprise Linux authentication services
Course Code: 2919
Learn how to plan business analysis activities; as well as the basics of eliciting, analyzing, modeling, and writing requirements. Learn how to verify and validate product requirements, gain approval, and manage the requirements through the life cycle of the project.
Course Code: 834065
Discover how Microsoft Copilot for Microsoft 365 elevates workplace productivity and innovation. This experience, tailored for the modern business leader, provides insights on crafting contextual prompts for Copilot and includes engaging use case exercises that showc...
Course Code: 2378
New – Earn your ICP-BAF certification in this three-day course! Participants will learn the customer-focused concepts, principles, and techniques behind Business Agility.
Course Code: 111223
Gain hands-on practice in Iteration Planning, Product Roadmap and Backlog, Estimating Practices, User Story Development and Iteration Execution for Non-Software applications.
Examine some of the major tools listed in the PMBOK® Guide, find out how and where they're used, and see what it will take you, the project manager (PM), to learn how to use the tools.
Learn how Hyper-V Replicas make it possible to copy Hyper-V virtual machines across a LAN or WAN even if you don't have a failover cluster or shared storage between the virtual machines.
Discover how the Red Hat Certified Architect program provides a credential that represents skills and knowledge needed for a world in which IT architecture is undergoing a period of rapid change and evolution.
When it comes to cyber security, we have a lot to look out for, take precautions against and be paranoid about. Learn more about these cybersecurity risks here.