Catalogue 225 Courses found
List of sub-fields
Course list
Reference | Course | Duration | Prices | |
---|---|---|---|---|
MS SC-5007 | SC-5007: Implement retention, eDiscovery, and Communication compliance in Microsoft Purview | 1 day 8 hours |
||
MS SC-5008 | SC-5008: Configure and manage entitlement with Microsoft Entra ID | 1 day 8 hours |
||
MS SC-900 | SC-900: Microsoft Security, Compliance, and Identity Fundamentals | 1 day 8 hours |
||
ISC SSCP-001 | SSCP - Systems Security Certified Practitioners | 3 days 24 hours |
||
IST CTFL-002 | The ISTQB® Foundation Level Agile Tester (CTFL-AT) | 2 days 16 hours |
||
EV8 TECH-033 | The IT Professional in the Digital Age | 1 day 8 hours |
||
VM CF-001 | VMware Cloud Foundation: Deploy, Configure, Manage 5.0 | 5 days 40 hours |
||
VM NS-002 | VMware NSX: Design V4.0 | 5 days 40 hours |
||
VM NS-001 | VMware NSX: Install, Configure, Manage [V4.0] | 5 days 40 hours |
||
VM VNSX-002 | VMware NSX: Troubleshooting and operations | 5 days 40 hours |
1 day (8 hours)
This course aims to provide the participants with these skills and knowledge:
- Understand the principles of data governance and compliance.
- Acquire knowledge about Microsoft Purview interface and its functionalities.
- Data lifecycle management principles and how they are applied.
- eDiscovery processes, including conducting searches and managing legal holds.
- Understand the communication compliance requirements and how they could be implemented.
MS SC-5007
By the end this course, the participants will learn about:
- How to entitle users to access your site and resources quickly and efficiently.
- Planning for and implementing access reviews ensuring adequate governance maintaining a secure solution.
- Monitoring, troubleshooting, and analyzing sign-in data using audit and diagnostic logs.
- Using Privileged Identity Management (PIM) to protect administrative roles and increase security.
- Microsoft Entra Permissions Management, discovering, remediating, and monitoring access events.
MS SC-5008
At the end of this course, participants should be able to:
- Describe Basic Concepts of Security, Compliance, and Identity.
- Describe the Concepts and Capabilities of Microsoft Identity and Access Management Solutions.
- Describe the Capabilities of Microsoft Security.
- Describe the Compliance Management Capabilities in Microsoft.
MS SC-900
3 days (24 hours)
At the end of the training, participants should be able to:
- Demonstrate an understanding of system security principles, policies, and procedures.
- Apply the skills necessary to implement and enforce system security principles, policies, and procedures in a secure computing environment.
- Analyze and manage systems and networks in a secure manner.
- Identify security vulnerabilities in systems and networks, along with strategies to reduce risks.
- Identify the latest developments in systems and network security.
- Develop the necessary skills to effectively analyze system security problems and provide solutions.
- Improve communication and coordination of system security processes with other IT and security teams.
- Provide insight into successful systems security management techniques.
ISC SSCP-001
2 days (16 hours)
At the end of the training, participants should be able to:
- Collaborate in a cross-functional Agile team being familiar with principles and basic practices of Agile software development.
- Adapt existing testing experience and knowledge to Agile values and principles.
- Support the Agile team in planning test-related activities.
IST CTFL-002
1 day (8 hours)
At the end of this module, participants should be able to:
- State the roles of IT professionals in this evolving technology-driven world.
- Explain keyways in which the role of IT professionals has evolved with the introduction of digital transformation.
EV8 TECH-033
5 days (40 hours)
By the end of the course, participants should be able to:
- Plan a deployment for VMware Cloud Foundation
- Understand VMware Cloud Foundation and supporting architecture.
- Configure VMware Cloud Foundation for VMware Cloud Connectivity.
- Understand the VMware Cloud Foundation subscription licensing model.
- Perform Day-Zero tasks.
- Perform VMware Cloud Foundation platform onboarding.
- Manage user credentials in VMware Cloud Foundation.
- Configure NSX networking in VMware Cloud Foundation.
- Deploy and manage Workload Domains.
VM CF-001
5 days (40 hours)
By the end of the course, participants should be able to:
- Understand and apply a design framework and the design and support for NSX-T Data Center infrastructure in a multi data center infrastructure.
- Apply a design process for gathering requirements, constraints, assumptions, and risks.
- Analyze existing physical networking and security components, processes, and operations as well as alternative design choices for risk mitigation and the operational readiness of an organization and perform a skills gap analysis.
- Design a VMware vSphere virtual data center to support NSX-T Data Center requirements; a physical network to support network virtualization in a software-defined data center; logical network and logical security services as well as a data center rack solution to support scalability and high availability.
VM NS-002
5 days (40 hours)
By the end of the course, participants should be able to:
- Describe the architecture and main components of NSX.
- Explain the features and benefits of NSX.
- Deploy the NSX Management cluster and VMware NSX® Edge™ nodes.
- Prepare VMware ESXi™ hosts to participate in NSX networking.
- Create and configure segments for layer 2 forwarding.
- Create and configure Tier-0 and Tier-1 gateways for logical routing.
- Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX.
VM NS-001
5 days (40 hours)
At the end of this training, the participants will be able to:
- Describe and explain the architecture and main components of NSX and the features and benefits of NSX; the use cases, importance, and architecture of Federation.
- Deploy the NSX Management cluster and VMware NSX® Edge™ nodes and prepare VMware ESXi™ hosts to participate in NSX networking.
- Create and configure segments for layer 2 forwarding: Tier-0 and Tier-1 gateways for logical routing.
- Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX; use VMware Identity Manager™ and LDAP to manage users and access.
- Configure Advanced Threat Prevention features; network services on NSX Edge nodes.