• Vendor

  • Microsoft Finance and Operations Core

    2 days
    This course discusses core components of Microsoft Dynamics 365 for Finance and Operations including how to configure core components of Microsoft Dynamics 365 for Finance and Operations and data migration and go-live preparation.

    Submit an Inquiry
  • Microsoft Identity and Access Administrator

    4 days
    This course provides IT Identity and Access Professional, along with IT Security Professional, with the knowledge and skills needed to implement identity management solutions based on Microsoft Azure AD, and it connected identity technologies. This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.

    Submit an Inquiry
  • Microsoft Power Platform Developer

    5 days
    The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes. In this course, students will learn how to build Power Apps, Automate Flows and extend the platform to complete business requirements and solve complex business problems.

    Submit an Inquiry
  • Microsoft Power Platform Fundamentals

    1 day
    Learn the business value and product capabilities of Microsoft Power Platform. Create simple Power Apps, connect data with Dataverse, build a Power BI Dashboard, automate processes with Power Automate, and build a chatbot with Power Virtual Agents. What we teach you: Describe the business value of Power Platform (20-25%) Identify the core components of Power Platform (15-20%) Describe the business value of Power BI (10-15%) Describe the business value of Power Apps (15-20%)

    Submit an Inquiry
  • Microsoft Security Operations Analyst

    4 days
    Learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Azure Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting.

    Submit an Inquiry
  • Microsoft Security, Compliance and Identity Fundamentals

    1 day
    This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.

    Submit an Inquiry
  • Migrating to AWS

    2 days
    In this course, you will learn strategies for planning and migrating existing workloads to the AWS Cloud, including portfolio discovery, application migration planning and design, migration execution, and post-migration validation and application optimization. The first part provides an overview of migration planning principles and best practices, and the second part focuses on migration design and implementation, with hands-on labs to reinforce concepts.

    Submit an Inquiry
  • Network Security and Secure Communication

    3 Days
    Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity.

    Submit an Inquiry
  • Networking Essentials for Cloud Applications on AWS

    1 day
    In this course, you will learn to: Design a networking infrastructure for a scalable production application, considering design trade-offs between different networking services. Configure networking services for a highly available, resilient, and scalable application. Implement the networking infrastructure according to evolving business requirements. Implement networking best practices to align towards AWS Well-Architected Framework.

    Submit an Inquiry
  • Node.JS And Web Application Security

    3 Days
    As a developer, your duty is to write bulletproof code. However... What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?

    Submit an Inquiry

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025