Facebook

Courses

We found 229 courses available for you
See

Microsoft Office Access 2019: Part 2

18 Lessons
8 hours
Intermediate

Course Description: Your training and experience using Microsoft® Office Access® …

What you'll learn
Provide input validation features to promote the entry of quality data into a database.
Organize a database for efficiency and performance, and to maintain data integrity.
Improve the usability of Access tables.
Create advanced queries to join and summarize data.
Use advanced formatting and controls to improve form presentation.
Use advanced formatting and calculated fields to improve reports.

Microsoft Office Access 2019: Part 1

19 Lessons
8 hours
Beginner

Course Description: Data is everywhere. Most job roles today involve …

What you'll learn
Navigate within the Access application environment, create a simple database, and customize Access configuration options.
Organize and manage data stored within Access tables.
Use queries to join, sort, and filter data from different tables.
Use forms to make it easier to view, access, and input data.
Create and format custom reports.
Featured

Microsoft Office Excel (2019-2016-2013): Advanced

17 Lessons
8 hours
Expert

Course Description: Clearly, you use Excel a lot in your …

What you'll learn
Work with multiple worksheets and workbooks.
Share and protect workbooks.
Automate workbook functionality.
Use Lookup functions and formula auditing.
Forecast data.
Create sparklines and map data.

DP-100T01-A: Designing and Implementing a Data Science Solution on Azure

39 Lessons
32 hours
Intermediate

360° Microsoft Azure data science certification Course The Microsoft Azure …

AZ-500T00-A: Microsoft Azure Security Technologies

31 Lessons
24 hours
Intermediate

Course Description: This course provides IT Security Professionals with the …

What you'll learn
Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
Implement perimeter security strategies including Azure Firewall.
Implement network security strategies including Network Security Groups and Application Security Groups.
Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
Implement Azure Key Vault including certificates, keys, and secretes.
Implement application security strategies including app registration, managed identities, and service endpoints.
Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
Implement Azure Monitor including connected sources, log analytics, and alerts.
Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
Implement Azure Sentinel including workbooks, incidents, and playbooks.

AZ-120T00-A: Planning and Administering Microsoft Azure for SAP Workloads

42 Lessons
32 hours
Intermediate

Course Description: This course teaches IT Professionals experienced in SAP …

-8%

DASA DevOps Professional: Enable and Scale

83 Lessons
16 hours
Intermediate

This 2-day course builds upon the DevOps fundamentals. The key …

What you'll learn
Explain the importance of DevOps culture and the aspects that can influence it.
Explain why courage, team building, leadership, and continuous improvement are required in a DevOps environment.
Explain why courage is essential to enable trust, honesty, and experimentation.
Identify and evaluate different types of behavior in a DevOps environment.
Recognize the signals indicating impediments and/or team dysfunctions.
Describe how to form good DevOps teams.
List the effects of happiness and motivation on team performance.
Assess the maturity of DevOps teams.
Identify how leaders encourage feedback and transparency.
Discuss the factors that leaders can influence to build trust.
Explain how and why leaders promote a “Safe to fail” environment.
Analyze value streams to improve throughput and flow.
Facilitate the tools for continuous improvement: structured problem-solving workshops, Story Mapping sessions, and retrospectives.

CCNA: Implementing and Administering Cisco Solutions

278 Lessons
40 hours
Intermediate

Course Description: Implementing and Administering Cisco Solutions (CCNA) is a …

What you'll learn
Identify the components of a computer network and describe their basic characteristics
Understand the model of host-to-host communication
Describe the features and functions of the Cisco Internetwork Operating System (IOS®) software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of TCP/IP and describe the operation of switches
Install a switch and perform the initial configuration
Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting
Describe the TCP/IP Transport layer and Application layer
Explore functions of routing
Implement basic configuration on a Cisco router
Explain host-to-host communications across switches and routers
Identify and resolve common switched network issues and common problems associated with IPv4 addressing
Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity
Describe the operation, benefits, and limitations of static routing
Describe, implement, and verify Virtual Local Area Networks (VLANs) and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols and describe components and terms of Open Shortest Path First (OSPF)
Explain how Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) work
Configure link aggregation using EtherChannel
Describe the purpose of Layer 3 redundancy protocols
Describe basic WAN and VPN concepts
Describe the operation of Access Control Lists (ACLs) and their applications in the network
Configure Internet access using Dynamic Host Configuration Protocol (DHCP) clients and explain and configure Network Address Translation (NAT) on Cisco routers
Describe basic Quality of Service (QoS) concepts
Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs)
Describe network and device architectures and introduce virtualization
Introduce the concept of network programmability and Software-Defined Networking (SDN) and describe smart network management solutions such as Cisco DNA Center™, Software-Defined Access (SD-Access), and Software-Defined Wide Area Network (SD-WAN)
Configure basic IOS system monitoring tools
Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement a basic security configuration of the device management plane
Implement basic steps to harden network devices