Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

162 Results Found for "certification prep guide"

Results per page: 10 40 80

TRANSFORM YOUR TECH: MODERNIZE SECURITY AND DEFEND AGAINST THREATS WITH MICROSOFT CERTIFICATIONS

Webinar – Recorded | Nov. 08, 2022

This is the first expert-level certification in Microsoft’s Security, Compliance, and Identity portfolio. This certification will focus on designing elements of a cybersecurity architecture and evaluating the tradeoffs between different solutions.

Microsoft Certifications: map your journey to success

Webinar – Recorded | Jan. 27, 2023

Mentally Prepare for CCNA 200-301 Version 1.1

Webinar – Recorded | Sep. 19, 2024

Top 10 Cybersecurity Risks: How Prepared Are You for 2013?

White Paper | Jan. 24, 2013

When it comes to cyber security, we have a lot to look out for, take precautions against and be paranoid about. Learn more about these cybersecurity risks here.

How to Build a VMware vSphere 6.x Home Lab

White Paper | Dec. 12, 2017

Learn how to build a home lab for VMware vSphere 6.x to reproduce the training environment and run course labs.

Cisco Completes the Security Picture with Sourcefire

White Paper | June 19, 2015

Rich Hummel discusses about Cisco's security solutions and how Cisco's acquisition of Sourcefire has changed the security landscape. Learn more here.

Critical Concepts of the 200-120 CCNA Routing and Switching Exam

White Paper | May 29, 2014

This paper helps you prepare to pass the latest version of the Cisco Certified Network Associate (CCNA) Routing and Switching exam.

Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure

White Paper | July 08, 2014

Knowing about the different components of IBM Tivoli Monitoring (ITM) and how they interact can make all the difference in terms of keeping an ITM system running strong.

Legal Issues of Cloud Forensics

White Paper | March 06, 2013

Cloud forensics involves exploring issues a company and its forensic examiner may face when suffering a breach of company information in the cloud. What issues will they face, and, if needed, how can they collect information from the cloud?