Filter by Topic
Filter by Vendor
Certified Threat Intelligence Analyst | CTIA eLearning
Course Description Certified Threat Intelligence Analyst (CTIA) is designed and …
PL-600 Power Platform Solution Architect
Exclusive – The Solution Architect is responsible for the successful …
What you'll learn
Becoming a Solution Architect/Getting to know your customer
Conceptualizing the design from requirements
Project governance and working as a team
Power Platform Architecture
Data Modeling
Analytics and artificial intelligence
Power Apps Architecture
Application Lifecycle Management (ALM)
Power Automate Architecture
Security Modeling
Integration
Dynamics 365 Applications Architecture
Power Virtual Agents architecture
Robotic Process Automation
Testing and Go Live
CompTIA Data+
Course Description As the importance of data analytics grows, more …
What you'll learn
CompTIA Data+ gives you the confidence to bring data analysis to life
Analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle
Mining data
Manipulating data
Visualizing and reporting data
Applying basic statistical methods
Certified Incident Handler | CIH eLearning
Course Description The EC-Council Certified Incident Handler (ECIH) program focuses …
Certified Penetration Testing Professional | CPENT eLearning
Course Description EC-Council’s Certified Penetration Tester (CPENT) program is all …
Computer Hacking Forensic Investigator | CHFI eLearning
Course Description The Computer Hacking Forensic Investigator (CHFI) course delivers …
What you'll learn
Establish threat intelligence and key learning points to support pro-active profiling and scenario modeling
Perform anti-forensic methods detection
Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
Extract and analyze of logs from various devices like proxy, firewall, IPS, IDS, Desktop, laptop, servers, SIM tool, router, firewall, switches AD server, DHCP logs, Access Control Logs & conclude as part of investigation process.
Identify & check the possible source / incident origin.
Recover deleted files and partitions in Windows, Mac OS X, and Linux
Conduct reverse engineering for known and suspected malware files
Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
Oracle 19c Database Administration II (Oracle DBA II) (TTOR20619)
Geared for participants experienced with Oracle 19c DBA essentials Oracle …
What you'll learn
Creating CDBs and Regular PDBs
Managing CDBs and PDBs
Backup and Duplicate
Upgrading and Transporting CDBs and Regular PDBs
Backup Strategies and Terminology
Restore and Recovery Concepts
Using Flashback Technologies
Duplicating a Database
Installing Grid Infrastructure and Oracle Database
Patching Grid Infrastructure and Oracle Database
Upgrading to Oracle Grid Infrastructure
Oracle Database 18c: New Features
Using General Overall Database Enhancements
Monitoring and Tuning Database Performance
Managing Application PDBs
Managing Security in Multitenant databases
Recovery and Flashback
Configuring and Using RMAN
Diagnosing Failures
Performing Recovery
Transporting Data
RMAN Troubleshooting and Tuning
Creating an Oracle Database by using DBCA
Oracle Restart
Upgrading the Oracle Database
Installing Grid Infrastructure for a Standalone server
Using Availability Enhancements
Tuning SQL Statements
Certified Penetration Testing Professional | CPENT
Course Description EC-Council’s Certified Penetration Tester (CPENT) program is all …