• Courses By Category

  • SharePoint Online, Teams and OneDrive management

    1 day

    Submit an Inquiry
  • Tenant-to-Tenant migration

    1 day

    Submit an Inquiry
  • The Essentials of Webex Calling

    5 days
    Introduce the components that make up the Webex solution, including Webex Meetings, Webex Messaging, and Webex Calling Introduce the components that make up Webex Calling Control Hub, including analytics, troubleshooting, and reporting Introduce the Management feature of Webex Control Hub, including how to set it up for a business Introduce the Services section of the Webex Control Hub, including the Webex Services, Cloud- +Connected Unified Communications Services, and Hybrid Services.

    Submit an Inquiry
  • Transforming to a Cisco Intent-Based Network (IBNTRN)

    5 days
    The Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco® SD-Access fits into Cisco Digital Network Architecture (Cisco DNA™). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals. You will learn how Cisco delivers intent-based networking across the campus, branch, WAN

    Submit an Inquiry
  • Understanding Cisco Service Provider Network Foundations

    5 days
    The Understanding Cisco Service Provider Network Foundations (SPFNDU) v1.1 training is designed to provide you with the foundational knowledge for the suite of Cisco® Certified Network Professional (CCNP®) Service Provider trainings. The training expands what you learned from the Cisco CCNA® training with a focus on theoretical and practical knowledge needed for the service provider environment.

    Submit an Inquiry
  • Web Application Security

    3 days
    As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?

    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025