-
CompTIA Pentest+
The course is designed to give participants practical skills and theoretical knowledge in the area of penetration testing necessary to succeed in the CompTIA Pentest+ certification exam.
Submit an Inquiry
-
Designing Microsoft Azure Infrastructure Solutions
Four-days instructor-led training teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication and identity, networks, high availability, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles.
Submit an Inquiry
-
Empower your workforce with MS 365 Copilot Use Cases
This one-day course is composed of two parts – Getting started with Microsoft 365 Copilot and Empower your workforce with Microsoft 365 Copilot Use Cases. The first part of the course introduces you to Copilot for Microsoft 365, examines how you can use Copilot throughout the various Microsoft 365 apps, explores best practices for using Copilot and building effective prompts, and examines how you can extend Copilot.
Submit an Inquiry
-
Exchange Hybrid Configuration and Migration Options
Submit an Inquiry
-
Introducing Automation for Cisco Solutions
The Introducing Automation for Cisco Solutions (CSAU) v1.2 training gives you a broad overview of network automation skills. Through a combination of lecture and hands-on labs, you will learn the fundamentals of automation such as working on model-driven programmability solutions with representational state transfer configuration protocol (RESTCONF) and network configuration protocol (NETCONF) protocols. The training also covers data formats and types, including Extensible Markup Language (XML), JavaScript
Submit an Inquiry
-
Troubleshooting Cisco Application Centric Infrastructure
Troubleshooting Cisco Application Centric Infrastructure - DCACIT (v.5.2) training gives participants the key components and procedures needed to manage, monitor, and troubleshoot Cisco® Nexus® 9000 Series Switches in Application Centric Infrastructure (ACI) mode. Participants learns a solution to simplify, optimize, and accelerate infrastructure deployment and governance.
Submit an Inquiry
-
Admin. Info. Protection & Compliance in MS 365
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Office 365 message encryption among other related topics.
Submit an Inquiry
-
Administering Windows Server Hybrid Core Infrastructure
This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment.
Submit an Inquiry
-
Advanced in AI Auditor (AAIA)
This two-day, official ISACA Advanced in AI Audit (AAIA) instructor-led course provides Information Systems auditors with the essential knowledge to assess the design, governance, and operational risks associated with AI systems. The training helps auditors understand the impact of AI on enterprise environments, systems, and human decision-making. Participants will explore AI risk frameworks, auditing tools, and techniques through practical exercises, real-world case studies, and collaborative discussions.
Submit an Inquiry
-
Advanced in AI Security Management (AAISM)
This two-day accelerated course provides a comprehensive foundation in AI-specific security management. The ISACA Advanced in AI Security Management (AAISM™) certification equips security leaders with the knowledge and capability to govern, secure, and manage enterprise AI systems. Learners gain a deep understanding of AI governance, AI risk management, and the technologies and controls that underpin secure and ethical AI operations.
Submit an Inquiry