Course Code: 101000
Build AI infused applications that leverage Azure Cognitive Services, Azure Cognitive Search, and Microsoft Bot Framework.
Course Code: 860011
Cisco U. not only brings together the depth of industry-leading certification, product, and role-based training that our learners have come to know and trust, including AppDynamics and Meraki, but also includes training from other adjacent technologies and learning p...
Course
The GK Polaris subscription program provides three unlimited training options. The Discovery subscription includes over 200 live virtual courses.
Course
The GK Polaris subscription program delivers unlimited access to Virtual Classroom Live training. Included are courses and certification prep for the most in-demand AWS cloud topics, such as administration, architecture, operations and security.
Course Code: 821577
During their five days in the classroom, students review the basics of C# program structure, language syntax, and implementation details, and then consolidate their knowledge throughout the week as they build an application that incorporates several features of .NET....
Watch the second installment of this 2-part webinar series and learn how to build and troubleshoot even more formulas and advanced functions. Whether you are a beginner or an experienced user looking for some extra or new tips, this is a webinar you don’t want to miss.
Course Code: 6544
Learn to build reusable tools with Windows PowerShell 3.0 and focus on the Windows PowerShell scripting language. Understand the concepts and techniques needed to design tools, including input, output and functional requirements. Enroll now in M55039 at Global Knowledge.
Examine 15 common myths surrounding virtualization from a vendor-neutral viewpoint.
A look at five basics to consider in any data center virtualization project: planning, balancing the various hardware components, sizing the storage properly, managing capacity, and automation.
Course Code: 840103
Exclusive – Cybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, a key component in modern cybersecurity strategies. Participants will learn to identify, analyze, and mitigate potential security threats in complex systems. The course...