Filter by Topic
Filter by Vendor
Microsoft Office Excel (2019-2016-2013): Basic
Course Description: Organizations the world over rely on information to …
What you'll learn
Get started with Microsoft Office Excel.
Perform calculations.
Modify a worksheet.
Format a worksheet.
Print workbooks.
Manage workbooks.
55299-A: SharePoint 2019 Site Owner Training
Course Description: This SharePoint 2019 Site Owner class is for …
What you'll learn
Learn to navigate a SharePoint 2019 Team Site.
Learn to create and edit web page content.
Learn to create site columns and content types.
Learn to integrate Office applications with SharePoint 2019.
Learn to manage basic permissions
Understand what Site Templates are.
Understand the different Tpes of Site Templates that come “Out of the Box”
Creating a new site using Site Templates
Create a Project site.
Create a Team site.
Create a Community site.
Create a Blog site.
Manage the sites listed in the Top Link Bar.
Understand what site pages are.
Understand what wiki pages are.
Understand what Web Parts are.
Understand how to add content to the Site Home page.
Understand how to create a wiki page library.
Understand how to add Web Parts.
Understand how to manage Web Parts.
Understand Site Columns.
Understand Content Types.
Understand how to create Site Columns.
Understand how to create Content Types.
Understand how to create a document template for a Content Type.
Understan how to assign a Content Type to a list or library.
Understand how to create new items based on a custom Content Type.
Understand SharePoint groups.
Understand how to create SharePoint groups.
Understand how to assign permission in SharePoint.
Understand how to view permission levels.
Understand how to manage permission inheritance at the site level.
Understand how to manage permission inheritance at the list or library level.
Understand how to edit a personal profile.
DP-100T01-A: Designing and Implementing a Data Science Solution on Azure
360° Microsoft Azure data science certification Course The Microsoft Azure …
AZ-500T00-A: Microsoft Azure Security Technologies
Course Description: This course provides IT Security Professionals with the …
What you'll learn
Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
Implement Azure AD Connect including authentication methods and on-premises directory synchronization.
Implement perimeter security strategies including Azure Firewall.
Implement network security strategies including Network Security Groups and Application Security Groups.
Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
Implement Azure Key Vault including certificates, keys, and secretes.
Implement application security strategies including app registration, managed identities, and service endpoints.
Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
Implement Azure Monitor including connected sources, log analytics, and alerts.
Implement Azure Security Center including policies, recommendations, and just in time virtual machine access.
Implement Azure Sentinel including workbooks, incidents, and playbooks.
AZ-120T00-A: Planning and Administering Microsoft Azure for SAP Workloads
Course Description: This course teaches IT Professionals experienced in SAP …
DASA DevOps Professional: Enable and Scale
This 2-day course builds upon the DevOps fundamentals. The key …
What you'll learn
Explain the importance of DevOps culture and the aspects that can influence it.
Explain why courage, team building, leadership, and continuous improvement are required in a DevOps environment.
Explain why courage is essential to enable trust, honesty, and experimentation.
Identify and evaluate different types of behavior in a DevOps environment.
Recognize the signals indicating impediments and/or team dysfunctions.
Describe how to form good DevOps teams.
List the effects of happiness and motivation on team performance.
Assess the maturity of DevOps teams.
Identify how leaders encourage feedback and transparency.
Discuss the factors that leaders can influence to build trust.
Explain how and why leaders promote a “Safe to fail” environment.
Analyze value streams to improve throughput and flow.
Facilitate the tools for continuous improvement: structured problem-solving workshops, Story Mapping sessions, and retrospectives.
CCNA: Implementing and Administering Cisco Solutions
Course Description: Implementing and Administering Cisco Solutions (CCNA) is a …
What you'll learn
Identify the components of a computer network and describe their basic characteristics
Understand the model of host-to-host communication
Describe the features and functions of the Cisco Internetwork Operating System (IOS®) software
Describe LANs and the role of switches within LANs
Describe Ethernet as the network access layer of TCP/IP and describe the operation of switches
Install a switch and perform the initial configuration
Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting
Describe the TCP/IP Transport layer and Application layer
Explore functions of routing
Implement basic configuration on a Cisco router
Explain host-to-host communications across switches and routers
Identify and resolve common switched network issues and common problems associated with IPv4 addressing
Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity
Describe the operation, benefits, and limitations of static routing
Describe, implement, and verify Virtual Local Area Networks (VLANs) and trunks
Describe the application and configuration of inter-VLAN routing
Explain the basics of dynamic routing protocols and describe components and terms of Open Shortest Path First (OSPF)
Explain how Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) work
Configure link aggregation using EtherChannel
Describe the purpose of Layer 3 redundancy protocols
Describe basic WAN and VPN concepts
Describe the operation of Access Control Lists (ACLs) and their applications in the network
Configure Internet access using Dynamic Host Configuration Protocol (DHCP) clients and explain and configure Network Address Translation (NAT) on Cisco routers
Describe basic Quality of Service (QoS) concepts
Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs)
Describe network and device architectures and introduce virtualization
Introduce the concept of network programmability and Software-Defined Networking (SDN) and describe smart network management solutions such as Cisco DNA Center™, Software-Defined Access (SD-Access), and Software-Defined Wide Area Network (SD-WAN)
Configure basic IOS system monitoring tools
Describe the management of Cisco devices
Describe the current security threat landscape
Describe threat defense technologies
Implement a basic security configuration of the device management plane
Implement basic steps to harden network devices
Veeam Availability Suite v11: Configuration and Management
Course Description: The Veeam® Availability Suite™ v11: Configuration and Management …
What you'll learn
Describe Veeam Availability Suite components usage scenarios and relevance to your environment.
Effectively manage data availability in on-site, off-site, cloud and hybrid environments.
Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met.
Configure Veeam Availability Suite to ensure data is protected effectively.
Adapt with an organization’s evolving technical and business data protection needs.
Ensure recovery is possible, effective, efficient, secure and compliant with business requirements.
Provide visibility of the business data assets, reports and dashboards to monitor performance and risks.