Filter by Topic
Filter by Vendor
55316: Administering A SQL Database
Course Description This instructor-led course provides students who manage SQL …
What you'll learn
Authenticate and authorize users
Assign server and database roles
Authorize users to access resources
Use encryption and auditing features to protect data
Describe recovery models and backup strategies
Backup and Restore SQL Server databases
Automate database management
Configure security for the SQL Server agent
Manage alerts and notifications
Managing SQL Server using PowerShell
Trace access to SQL Server
Monitor a SQL Server infrastructure
Troubleshoot a SQL Server infrastructure
Import and export data
Certified Threat Intelligence Analyst | CTIA eLearning
Course Description Certified Threat Intelligence Analyst (CTIA) is designed and …
What you'll learn
Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript
Interact with AWS services and develop solutions by using the AWS SDK
Use AWS Identity and Access Management (IAM) for service authentication
Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as data stores
Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions
Use Amazon Cognito for user authentication
Use Amazon ElastiCache to improve application scalability
Leverage the CI/CD pipeline to deploy applications on AWS
PL-600 Power Platform Solution Architect
Course Description Exclusive – The Solution Architect is responsible for …
What you'll learn
Becoming a Solution Architect/Getting to know your customer
Conceptualizing the design from requirements
Project governance and working as a team
Power Platform Architecture
Data Modeling
Analytics and artificial intelligence
Power Apps Architecture
Application Lifecycle Management (ALM)
Power Automate Architecture
Security Modeling
Integration
Dynamics 365 Applications Architecture
Power Virtual Agents architecture
Robotic Process Automation
Testing and Go Live
CompTIA Data+
Course Description As the importance of data analytics grows, more …
What you'll learn
CompTIA Data+ gives you the confidence to bring data analysis to life
Analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle
Mining data
Manipulating data
Visualizing and reporting data
Applying basic statistical methods
Certified Incident Handler | CIH eLearning
Course Description The EC-Council Certified Incident Handler (ECIH) program focuses …
Certified Penetration Testing Professional | CPENT eLearning
Course Description EC-Council’s Certified Penetration Tester (CPENT) program is all …
Computer Hacking Forensic Investigator | CHFI eLearning
Course Description The Computer Hacking Forensic Investigator (CHFI) course delivers …
What you'll learn
Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
Perform anti-forensic methods detection
Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
Identify & check the possible source / incident origin.
Recover deleted files and partitions in Windows, Mac OS X, and Linux
Conduct reverse engineering for known and suspected malware files
Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents