Course Code: 100965
Understand how to develop and enhance your leadership skills.
Course Code: 834084
Implement the Microsoft Defender for Endpoint environment to manage devices, perform investigations on endpoints, manage incidents in Defender XDR, and use Advanced Hunting with Kusto Query Language (KQL) to detect unique threats. You'll need to have access to a Micr...
Course Code: 860043
The Enhancing Cisco Security Solutions with Data Analytics (ECSS) training covers intermediate-level knowledge of Splunk, including its fundamentals, key components, and architecture so you can detect, investigate, and respond to security threats effectively. You’ll...
Course Code: 0509
Learn how to create a soft-skills lesson from scratch, record and produce software demonstrations, and interactive training simulations.
Course Code: 860072
This two-day course provides you with a focused introduction to Cisco ISE, equipping you with the practical skills to deploy and manage secure network access. You will configure identity sources, set up authentication and authorization policies for users and devices,...
Course Code: 100327
Exclusive – Curious about becoming an expert in Azure Data Science? This course is for you. We will teach you to Design and Implement a Data Science Solution on Azure.
Course Code: 100690
Microsoft Teams admins configure, deploy, and manage Office 365 workloads for Microsoft Teams focusing on efficient acollaboration and communication.
Course Code: 100763
Exclusive – This course teaches IT Pros how to manage their Azure subscriptions, secure identities, administer the infrastructure, & configure virtual networking.
Course Code: 100865
New – New - This course provides students with the knowledge and skills to administer a SQL Server database infrastructure. Microsoft Certified Course.
Course Code: 821769
The course introduces essential elements of modern management and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technolo...