Courses By Category
-
SharePoint Online, Teams and OneDrive management
1 day
Submit an Inquiry
-
Tenant-to-Tenant migration
1 day
Submit an Inquiry
-
The Essentials of Webex Calling
5 days
Introduce the components that make up the Webex solution, including Webex Meetings, Webex Messaging, and Webex Calling
Introduce the components that make up Webex Calling Control Hub, including analytics, troubleshooting, and reporting
Introduce the Management feature of Webex Control Hub, including how to set it up for a business
Introduce the Services section of the Webex Control Hub, including the Webex Services, Cloud- +Connected Unified Communications Services, and Hybrid Services.
Submit an Inquiry
-
Transforming to a Cisco Intent-Based Network (IBNTRN)
5 days
The Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco® SD-Access fits into Cisco Digital Network Architecture (Cisco DNA™). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals. You will learn how Cisco delivers intent-based networking across the campus, branch, WAN
Submit an Inquiry
-
Understanding Cisco Service Provider Network Foundations
5 days
The Understanding Cisco Service Provider Network Foundations (SPFNDU) v1.1 training is designed to provide you with the foundational knowledge for the suite of Cisco® Certified Network Professional (CCNP®) Service Provider trainings. The training expands what you learned from the Cisco CCNA® training with a focus on theoretical and practical knowledge needed for the service provider environment.
Submit an Inquiry
-
Web Application Security
3 days
As a developer, your duty is to write bulletproof code. However...
What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?
Submit an Inquiry