Showing 409-424 of 424 results
D83527 – Java SE 8 Fundamentals
Module 1: What Is a Java Program? Module 2: Creating a Java Main Class Module 3: Data In the Cart Module 4: Managing Multiple Items Module 5: Describing Objects and Classes Module 6: Manipulating and Formatting the Data in Your Program Module 7: Creating and Using Methods Module 8: Using…
P10380 – Oracle Database 18c: Administration Workshop
Module 1: Introduction Sample HR Schema Oracle Cloud Overview Oracle Database Editions, Options, and Management Packs Module 2: Oracle Database Architecture Automatic Storage Management (ASM) Overview Oracle Database Instance Configurations Oracle Database Memory and Process Structures Connecting to the Database Instance Logical and Physical Database Structures Multitenant Architecture Oracle Database…
MB-335T00 – Microsoft Dynamics 365 Supply Chain Management, Expert
1. Create products and product masters in Dynamics 365 Supply Chain Management Product information is the pillar of supply chain and retail applications across all industries. In the various modules of a business solution, product-specific information and setup are required to manage the business processes that are related to specific…
SC-900T00 – Microsoft Security, Compliance and Identity Fundamentals
1. Describe security and compliance concepts Learn about common security and compliance concepts that are foundational to Microsoft solutions. Topics include the shared responsibility and Zero Trust models, encryption, data residency and data sovereignty, and more. Click here to know more 2. Describe identity concepts Learn about the key concepts…
AZ-900T00 – Microsoft Azure Fundamentals
1. Describe cloud computing This module introduces you to cloud computing. It covers things such as cloud concepts, deployment models, and understanding shared responsibility in the cloud. Click here to know more 2. Describe the benefits of using cloud services This module introduces you to the benefits cloud computing can…
FT-FSM – FortiSIEM Basic Training
Introduction SIEM and PAM Concepts Discovery FortiSIEM Analytics CMDB Lookups and Filters Group By and Aggregations Rules Incidents and Notification Policies Reports and Dashboards Maintaining and Tuning FortiSIEM Agents
FT-FGT-SEC – FortiGate Security
Introduction to FortiGate and the Security Fabric Firewall Policies Network Address Translation (NAT) Firewall Authentication Logging and Monitoring Certificate Operations Web Filtering Application Control Antivirus Intrusion Prevention and Denial of Service SSL VPN Dial-Up IPsec VPN Data Leak Prevention (DLP)
FT-FGT-INF – FortiGate Infrastructure
Routing Software-Defined WAN (SD-WAN) Layer 2 Switching Virtual Domains Site-to-Site IPsec VPN Fortinet Single Sign-On (FSSO) High Availability (HA) Web Proxy Diagnostics
EMC-ESMIT – Establishing Service Management for ITaaS
Module 1: Service Management Overview Define service management business drivers Summarize the benefits of service management Discuss essential service management concepts and the service life-cycle Discuss the transformation framework of ITaaS from a service Module 2: Service Management Planning Discuss the ITaaS program for establishing service management Discuss the program initiation steps and…
EMC-ESN – Enterprise Storage Networking
Module 1: Requirement Analysis and Design Strategy Requirement Gathering and Analysis Developing a Storage Networking Design Strategy Business Value Analysis Implementation and Validation Module 2: Designing FC SAN Fabric Design Models and Considerations Fabric Security Design Considerations Module 3: Designing IP SANs iSCSI Design Considerations FCIP Design Considerations Module 4:…
EMC-EBR – Enterprise Backup Recovery
Course Content Module 1: Business Continuity (BC) Project Lifecycle Requirement Gathering and Analysis Developing BC Strategy and Solutions Business Value Analysis Implementation and Validation Module 2: Backup and Recovery Design Backup Strategy Considerations Backup Infrastructure Design Backup in NAS Environment and Server Configuration Backup Backup Solution Migration Backup Management Considerations…
CBDEB – Ethereum Training: Hands-on Ethereum Development Bootcamp
Introduction Background Introductions Overview Scheduling Lab Environment Misc. What is Blockchain? The History of Decentralized Ledgers Blockchain Mechanics Assets in Blockchain The Blockchain Ledger Type of Blockchain Transactions Blockchain as Workflow The History of Blockchain Bringing DLT into the Modern Age What is a Block? How are Blocks Chained? Bitgold…
BCSA-BTA-2 – Blockchain Solution Architecture Training
1. What is Blockchain Blockchain Basic Principles Centralized and Decentralized Ledgers Mechanics of Blockchain What is a Block? How are Blocks Chained Together? 2. How Does Blockchain Work Benefits and Drawbacks of Blockchain Cryptography Public Key Cryptography Cryptographic Hashing Blockchain Consensus Proof of Work Consensus Proof of Stake Consensus Other…
BCO-BTA-1 – Blockchain An Overview for Business Professionals Training
Module 1: What is Blockchain Technology Overview History of Blockchain Cryptocurrencies (Bitcoin) & Blockchain Module 2: Non-Technical Technology Overview Cryptography for Executives Key Concepts o Public Ledgers – Hashes, Block Hashes – Distributed& Peer to Peer Technologies – Digital Tokens o Smart Contracts – Bitcoin Mining Authorization & Authentication Security…
Create a Spotify Clone from Scratch
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries,…
Kotlin Language for Java Developers
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries,…