
Events Search and Views Navigation
June 2020
Azure Developer Advanced Solutions (Course 3)
Four days from 8:00am–5:00pm. This course is designed for developers who already know how to code in at least one of the Azure-supported languages. This course is part of a series of four courses to help you prepare for Microsoft’s Azure Developer certification exam AZ-201: Develop Advanced Microsoft Azure Cloud Solutions. For more information or to register, contact Autumn Becker.
Find out more »August 2020
Vmware vSphere: Install, Configure, Manage
Five days from 8:30am–4:30pm. Exam voucher included. This five-day VIRTUAL course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 6.7, which includes VMware ESXi™ 6.7 and VMware vCenter Server® 6.7. This course prepares you to administer a vSphere infrastructure for an organization of any size. It is the foundation for most other VMware technologies in the software-defined data center. For more information or to register, contact Autumn Becker.
Find out more »Ethical Hacking & Countermeasures Training (CEH)
Five days from 8:30am- 4:30pm. This course will benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. This class will immerse the participants into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work…
Find out more »October 2020
Computer Hacking Forensics Investigator (CHFI)
Five days. 8:00am- 5:00pm. The tools and techniques covered in this EC-Council’s CHFI training program will prepare the student to conduct computer investigations using groundbreaking digital forensics technologies. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI…
Find out more »November 2020
Microsoft Azure Administrator
Four days from 8:30am–4:30pm. This 4-day course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. For more information or to register, contact Autumn Becker.
Find out more »