Facebook

Courses

We found 139 courses available for you
See

Certified Threat Intelligence Analyst | CTIA eLearning

6 Lessons
24 hours
Intermediate

Course Description Certified Threat Intelligence Analyst (CTIA) is designed and …

PL-600 Power Platform Solution Architect

24 hours
Intermediate

Exclusive – The Solution Architect is responsible for the successful …

What you'll learn
Becoming a Solution Architect/Getting to know your customer
Conceptualizing the design from requirements
Project governance and working as a team
Power Platform Architecture
Data Modeling
Analytics and artificial intelligence
Power Apps Architecture
Application Lifecycle Management (ALM)
Power Automate Architecture
Security Modeling
Integration
Dynamics 365 Applications Architecture
Power Virtual Agents architecture
Robotic Process Automation
Testing and Go Live

CompTIA Data+

40 hours
Beginner

Course Description As the importance of data analytics grows, more …

What you'll learn
CompTIA Data+ gives you the confidence to bring data analysis to life
Analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle
Mining data
Manipulating data
Visualizing and reporting data
Applying basic statistical methods

Certified Incident Handler | CIH eLearning

9 Lessons
24 hours
All Levels

Course Description The EC-Council Certified Incident Handler (ECIH) program focuses …

Certified Penetration Testing Professional | CPENT eLearning

14 Lessons
24 hours
All Levels

Course Description EC-Council’s Certified Penetration Tester (CPENT) program is all …

Computer Hacking Forensic Investigator | CHFI eLearning

16 Lessons
24 hours
All Levels

Course Description The Computer Hacking Forensic Investigator (CHFI) course delivers …

What you'll learn
Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
Perform anti-forensic methods detection
Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
Identify & check the possible source / incident origin.
Recover deleted files and partitions in Windows, Mac OS X, and Linux
Conduct reverse engineering for known and suspected malware files
Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents

Oracle 19c Database Administration II (Oracle DBA II) (TTOR20619)

40 hours
Intermediate

Geared for participants experienced with Oracle 19c DBA essentials Oracle …

What you'll learn
Creating CDBs and Regular PDBs
Managing CDBs and PDBs
Backup and Duplicate
Upgrading and Transporting CDBs and Regular PDBs
Backup Strategies and Terminology
Restore and Recovery Concepts
Using Flashback Technologies
Duplicating a Database
Installing Grid Infrastructure and Oracle Database
Patching Grid Infrastructure and Oracle Database
Upgrading to Oracle Grid Infrastructure
Oracle Database 18c: New Features
Using General Overall Database Enhancements
Monitoring and Tuning Database Performance
Managing Application PDBs
Managing Security in Multitenant databases
Recovery and Flashback
Configuring and Using RMAN
Diagnosing Failures
Performing Recovery
Transporting Data
RMAN Troubleshooting and Tuning
Creating an Oracle Database by using DBCA
Oracle Restart
Upgrading the Oracle Database
Installing Grid Infrastructure for a Standalone server
Using Availability Enhancements
Tuning SQL Statements

Certified Penetration Testing Professional | CPENT

14 Lessons
120 hours
Intermediate

Course Description EC-Council’s Certified Penetration Tester (CPENT) program is all …