Exam AZ-203 : Developing Solu-tions for Microsoft Azure
This course teaches Azure Architects about technologies used to manage, deploy and configure their Azure resources (storage, compute, networking, and Azure AD). They will also learn how to plan and implement a migration of on-premises resources and infrastructure to Azure , how to make the whole enterprise system resilient when failures occur, and how deployments can be automated and predictable. Additionally they will learn how to build Logic App solutions by automating tasks and business processes as workflows, how to Implement authentication in applications, implement secure data , and manage cryptographic keys; and learn how to configure a message-based integration architecture, develop for asynchronous processing, create apps for autoscaling, and better understand Azure Cognitive Services solutions. This course prepares for the Microsoft exam AZ-300.
This course teaches Azure Architects how to Design and Manage security and identity within the context of Azure , integrate multiple SaaS services, Compare and Manage Various Database Options, Storage Options and Connectivity Options. They will also learn Learn how to deploy an ARM templates, author complex deployments, and integrate an API or Logic App with the API Management service. Additionally they will be able to describe DNS and IP strategies for VNETs in Azure, compare connectivity options for adhoc and hybrid connectivity, distribute network traffic across multiple loads using load balancers, and design a hybrid connectivity scenario between cloud and on-premise. This course prepares for the Microsoft exam AZ-301.
This course teaches DevOps professionals how to design and implement DevOps practices for version control, compliance, infrastructure as code, configuration management, build, release, and testing by using Azure technologies. This course prepares for the Microsoft exam AZ-400.
In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.
This course will provide foundational level knowledge of cloud services, and how cloud services are provided with Microsoft Azure. The course can be taken as an optional first step in learning about cloud services and Microsoft Azure.
This 5 days course let you obtain all the competences and knowledge necessary to lead all the processes for implementing and complying with the requirements of the General Data Protection Regulation (GDPR) in an organization. “PECB Certified Data Protection Officer” exam included
This course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in the organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and how you can approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
An intensive three-day course for professionals facing issues and changes in their work environment. Through this very dynamic and participative class, our change management training courses will give you details of the process, techniques and best practices for successfully managing change as well as innovation, new roles and expanding responsibilities. You will acquire the knowledge, tools and techniques for preparing changes and taking the best actions/reactions for managing uncertainty.
This extensively hands-on course focuses on deploying, securing, operating and maintaining the Cisco Unified Computing System (UCS) and UCS C-Series Rack Servers for use in data centers. It covers configuring and managing Cisco UCS servers using unified I/O networking for LAN and SAN connectivity, virtualizing server hardware identifiers to enable rapid recovery of server operating system images, automating UCS deployments using UCS Central Software and Cisco Integrated Management Controller (IMC) Supervisor, configuring fault tolerance, implementing rolebased access control (RBAC), backing up and restoring system configurations, using the monitoring and troubleshooting tools in Cisco UCS Manager and Cisco IMC..