Find a course

Find the best courses in your region.

Catalogue 225 Courses found

List of sub-fields

Course list

This course aims to provide the participants with these skills and knowledge:

  • Understand the principles of data governance and compliance.
  • Acquire knowledge about Microsoft Purview interface and its functionalities.
  • Data lifecycle management principles and how they are applied. 
  • eDiscovery processes, including conducting searches and managing legal holds.
  • Understand the communication compliance requirements and how they could be implemented.
MS SC-5007

By the end this course, the participants will learn about:

  • How to entitle users to access your site and resources quickly and efficiently.
  • Planning for and implementing access reviews ensuring adequate governance maintaining a secure solution.
  • Monitoring, troubleshooting, and analyzing sign-in data using audit and diagnostic logs.
  • Using Privileged Identity Management (PIM) to protect administrative roles and increase security.
  • Microsoft Entra Permissions Management, discovering, remediating, and monitoring access events.
MS SC-5008
At the end of this course, participants should be able to:

  • Describe Basic Concepts of Security, Compliance, and Identity.
  • Describe the Concepts and Capabilities of Microsoft Identity and Access Management Solutions.
  • Describe the Capabilities of Microsoft Security.
  • Describe the Compliance Management Capabilities in Microsoft.
MS SC-900
At the end of the training, participants should be able to:

  • Demonstrate an understanding of system security principles, policies, and procedures.
  • Apply the skills necessary to implement and enforce system security principles, policies, and procedures in a secure computing environment.
  • Analyze and manage systems and networks in a secure manner.
  • Identify security vulnerabilities in systems and networks, along with strategies to reduce risks.
  • Identify the latest developments in systems and network security.
  • Develop the necessary skills to effectively analyze system security problems and provide solutions.
  • Improve communication and coordination of system security processes with other IT and security teams.
  • Provide insight into successful systems security management techniques.
ISC SSCP-001
At the end of the training, participants should be able to:

  • Collaborate in a cross-functional Agile team being familiar with principles and basic practices of Agile software development.
  • Adapt existing testing experience and knowledge to Agile values and principles.
  • Support the Agile team in planning test-related activities.
IST CTFL-002

At the end of this module, participants should be able to:

  • State the roles of IT professionals in this evolving technology-driven world.
  • Explain keyways in which the role of IT professionals has evolved with the introduction of digital transformation.
EV8 TECH-033

By the end of the course, participants should be able to:

  • Plan a deployment for VMware Cloud Foundation
  • Understand VMware Cloud Foundation and supporting architecture.
  • Configure VMware Cloud Foundation for VMware Cloud Connectivity.
  • Understand the VMware Cloud Foundation subscription licensing model.
  • Perform Day-Zero tasks.
  • Perform VMware Cloud Foundation platform onboarding.
  • Manage user credentials in VMware Cloud Foundation.
  • Configure NSX networking in VMware Cloud Foundation.
  • Deploy and manage Workload Domains.

VM CF-001
5 days (40 hours)

By the end of the course, participants should be able to:

  • Understand and apply a design framework and the design and support for NSX-T Data Center infrastructure in a multi data center infrastructure.
  • Apply a design process for gathering requirements, constraints, assumptions, and risks.
  • Analyze existing physical networking and security components, processes, and operations as well as alternative design choices for risk mitigation and the operational readiness of an organization and perform a skills gap analysis.
  • Design a VMware vSphere virtual data center to support NSX-T Data Center requirements; a physical network to support network virtualization in a software-defined data center; logical network and logical security services as well as a data center rack solution to support scalability and high availability.
VM NS-002

By the end of the course, participants should be able to:

  • Describe the architecture and main components of NSX.
  • Explain the features and benefits of NSX.
  • Deploy the NSX Management cluster and VMware NSX® Edge™ nodes.
  • Prepare VMware ESXi™ hosts to participate in NSX networking.
  • Create and configure segments for layer 2 forwarding.
  • Create and configure Tier-0 and Tier-1 gateways for logical routing.
  • Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX.
VM NS-001

At the end of this training, the participants will be able to:

  • Describe and explain the architecture and main components of NSX and the features and benefits of NSX; the use cases, importance, and architecture of Federation.
  • Deploy the NSX Management cluster and VMware NSX® Edge™ nodes and prepare VMware ESXi™ hosts to participate in NSX networking.
  • Create and configure segments for layer 2 forwarding: Tier-0 and Tier-1 gateways for logical routing.
  • Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX; use VMware Identity Manager™ and LDAP to manage users and access.
  • Configure Advanced Threat Prevention features; network services on NSX Edge nodes.
VM VNSX-002
Items per page :