In the upcoming months, we recommend IT education for professional and career development of IT specialists. New additions have been included, which are also presented in other news articles!
This is a 5-day ILT course that is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 11 PCs and devices in an on-premises Windows Server Active Directory domain environment.
Learn the business value and product capabilities of Microsoft Power Platform. Create simple Power Apps, connect data with Dataverse, build a Power BI Dashboard, automate processes with Power Automate, and build a chatbot with Power Virtual Agents.
This course will prepare you to configure the most important business processes in SAP S/4HANA Service. The configuration for both and on-site service process and an in-house repair process is explained. Service contract configuration is also a topic. In addition the integration with Controlling, with the Cross-Application Time Sheet (CATS) and integration with Logistics in SAP S/4HANA is covered.
Candidates for this course automate time-consuming and repetitive tasks by using Microsoft Power Automate. They review solution requirements, create process documentation, and design, develop, troubleshoot, and evaluate solutions. Candidates work with business stakeholders to improve and automate business workflows. They collaborate with administrators to deploy solutions to production environments, and they support solutions.
This course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step in learning about cloud services and Microsoft Azure, before taking further Microsoft Azure or Microsoft cloud services courses.
This course describes the architecture, components, and operations of routers and switches in a small network. Students learn how to configure a router and a switch for basic functionality. By the end of this course, students will be able to configure and troubleshoot routers and switches and resolve common issues with RIPv1, RIPv2, single-area and multi-area OSPF, virtual LANs, and inter-VLAN routing in both IPv4 and IPv6 networks.
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi™ 8 and VMware vCenter® 8. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most VMware technologies in the software-defined data center.
This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles.
This course goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Attending both Red Hat System Administration I and Red Hat System Administration II can help you in your preparation for the Red Hat Certified System Administrator exam (EX200).
The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes. In this course, students will learn how to build Power Apps, Automate Flows and extend the platform to complete business requirements and solve complex business problems.
The DP-203 course focuses on data engineering for batch and real-time analytical solutions using Azure data platform technologies. Students will explore core compute and storage technologies, interactively analyze data in a data lake, and learn ingestion techniques with tools like Apache Spark in Azure Synapse Analytics or Azure Databricks, as well as Azure Data Factory or Azure Synapse pipelines. The course covers data transformation using these technologies,
emphasizes data security measures, and guides students in creating real-time analytical solutions.
its 12th version, the Certified Ethical Hacker provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.
Strengthen your ABAP skills by gaining a full understanding of the use of object-oriented programming techniques, and how to apply them practically in your ABAP applications.
The Advanced C# Programming course will take you to the next level as a C# programmer. You will learn more advanced features of the C# programming language and the .NET framework
This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere 8 features that build a foundation for a truly scalable infrastructure. You also discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features
and controls can benefit your organization.
During this four-day course, you will gain the knowledge, skills, and tools to plan and deploy a VMware vSAN™ cluster. You will learn about managing and operating vSAN. This course focuses on building the required skills for common Day-2 vSAN administrator tasks such as vSAN node management, cluster maintenance, security operations, troubleshooting and advanced vSAN cluster operations. You will learn these skills through the completion of instructor-led activities
and hands-on lab exercises.
This five-day training course provides you with the knowledge, skills, and abilities to achieve competence in troubleshooting the VMware vSphere® 8 environment. This course increases your skill level and competence in using the command-line interface, VMware vSphere® Client™, log files, and other tools to analyze and solve problems.
The Microsoft Dynamics NAV/365 Business Central Functional Academy provides comprehensive training across eight key modules, covering essential aspects of Dynamics NAV/365 BC. This program equips students with knowledge and skills necessary for offering 1st Level support to end users, understanding vendor solutions, and supervising implementation work. Participants gain expertise from basic to advanced functional knowledge, making them valuable assets. This unique
opportunity, held once every one to two years, is ideal for individuals and solution vendors seeking top-notch training for Dynamics NAV/365 BC, ensuring they stay current and competitive in the market.
In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server and Windows clients.
In this course, students will learn to perform discovery, capture requirements, engage subject matter experts and stakeholders, translate requirements, and configure Microsoft Power Platform solutions and apps. They will supplement their learnings with hands-on labs to create application enhancements, custom user experiences, system integrations, data conversions, custom process automation, and custom visualizations.
If you are tasked with implementing, managing, or protecting web applications, then this course is for you. If you are a cyber or tech professional who is interested in learning or recommending mitigation methods to a myriad of web security issues and want a pure hands-on program, then this is the course you have been waiting for.
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Office 365 message encryption among other related topics.
This six-day instructor led course will provide delegates with the essential knowledge and skills to either manage a project or be an effective, valuable member of the project team. It covers the fundamental steps in any project lifecycle and also addresses the necessary people skills such as effective negotiation, conflict resolution, leadership and team building.
Certified Network Defender has been designed by industry experts to help IT Professionals play an active role in the Protection of digital business assets and Detection and Response to Cyber Threats, while leveraging Threat Intelligence to Predict them before they happen. CND is a network security course designed to help organizations create and deploy the most comprehensive network defense system.
This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution.
Learn how to operate machine learning solutions at cloud scale using Azure Machine Learning. This course teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring in Microsoft Azure.
An IT architect is an expert who prepares high-level solutions for business applications, systems, portfolios, infrastructures or the entire enterprise. It develops IT services and solutions for businesses and organizations and often designs and manages communications, security, networking, storage, etc.
This course will teach the basics of Microsoft's dialect of the standard SQL language: Transact-SQL. Topics include both querying and modifying data in relational databases that are hosted in Microsoft SQL Server-based database systems, including: Microsoft SQL Server, Azure SQL Database and, Azure Synapse Analytics.
Explore fundamental concepts in artificial intelligence (AI) and discover Microsoft Azure services for creating AI solutions. This course is not aimed at turning students into professional data scientists or developers but focuses on building awareness of common AI workloads and identifying Azure services to support them.
In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like
Azure Active Directory, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data.
These skills are a fundamental and necessary condition for quality management of the manufacturing module in the Microsoft Dynamics solution.
Goal of this training is to transfer comprehensive knowledge about the manufacturing module to all customers running the Manufacturing module and all consultants, both new and experienced, who will need to setup, maintain and develope the Dynamics manufacturing system.
This program provides the entire process of incident handling and response and hands-on labs that teach the tactical procedures and techniques required to effectively plan, record, triage, notify and contain. Students will learn the handling of various types of incidents, risk assessment methodologies, as well as laws and policies related to incident handling. After attending the course, students will be able to create IH&R policies
and deal with different types of security incidents such as malware, email security, network security, web application security, cloud security, and insider threat-related incidents.
Master the skills needed to deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment with Microsoft 365. This course provides comprehensive training for the Modern Desktop Administrator role, covering topics such as Windows deployment, device management, application deployment, and security configurations. Gain hands-on experience and expertise through practical exercises and real-world scenarios.
This course teaches IT Pros how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory–related issues with Windows Server 2022. Additionally, this course teaches how to deploy other Active Directory server roles such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services
(AD CS).
This course is designed to provide you with the knowledge and skills required to install and configure Windows 11 desktops and devices in an on-premises Windows Server Active Directory domain environment. The skills you gain by attending this course include: learning how to install and customize Windows 11 operating systems and apps, configuring local and remote network connectivity and storage, configure data security, device security, and network security,
maintain, update, and recover Windows 11.
This course is intended for IT professionals who wish to use the Transact-SQL language to query and configure Microsoft SQL Server. Students are typically database developers and database administrators, but might also be Business Intelligence developers, report creators, or application developers. In this course, students learn how to query single tables, join data from multiple tables, filter and sort data, modify data, use procedures and functions, and
implement error handling.
In this course the participants will gain an overview of SAP Workflow. This overview includes the used concepts and the used inboxes. An overview about the delivered reporting is another focus in this course. The participants will use delivered SAP Workflows in this interactive hands-on course.
You want to learn about the workflow functionality in S/4HANA, S/4HANA Cloud and SAP Cloud Platform? This course provides a business overview of processes, which are working "right out-of-the box". It explains possible extensions and comes with several exercises to deepen the theoretical lessons.
This course will introduce the audience to SharePoint Online Administration in Office 365 and explain and demonstrate the configuration options for SharePoint Online. The course will also help SharePoint on-premise administrators understand the differences between SharePoint on-premises and SharePoint Online.
This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments.
This course will discuss the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI.
Designed for anyone new to the Service Department or the Service sector in general, this day is geared around the end-user using the Service Module within Dynamics 365 Business Central.
You’ll learn the basics around the service item card, service contracts, service quotes, service orders and service invoicing.
You’ll learn even more about how the Service Module is setup within Dynamics 365 Business Central including linking service orders to jobs as well as reporting.
The Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified Ethical Hacker (C|EH) certification, to address the global demand for a qualified cybersecurity workforce.
The Certified Chief Information Security Officer (CCISO) is a professional certification by EC-Council for experienced information security leaders. Focusing on key domains like governance, risk management, and strategic planning, it equips cybersecurity professionals with leadership skills needed to manage an organization's information security effectively. The CCISO is globally recognized, ideal for senior security roles and those aspiring to executive
positions.
Through a combination of lecture and hands-on labs, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation and software-defined networking.
Gain a detailed knowledge of the fundamental concepts of ABAP and learn how to comfortably and efficiently work with the ABAP Workbench tools in order to undertake custom developments with confidence.
This course will discuss the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI.
This course is intended for IT professionals who wish to use the Transact-SQL language to query and configure Microsoft SQL Server. Students are typically database developers and database administrators, but might also be Business Intelligence developers, report creators, or application developers. In this course, students learn how to query single tables, join data from multiple tables, filter and sort data, modify data, use procedures and functions, and
implement error handling.
In this course the key business processes that can be found within the Supply Chain Execution area of the SAP S/4HANA Enterprise Management solution are discussed. Both inbound (goods receipt) and outbound (goods issue) processes are included. Organizational units, master data and the monitoring of these processes as well as integration with the Extended Warehouse Management (EWM) and Transportation Management (TM) solutions of SAP are also discussed. Examples of
other topics included in the course are Yard Management and Value-added Services (VAS).
The Certified Cybersecurity Technician (C|CT) is an entry-level cybersecurity program created by EC-Council, the creator of the Certified Ethical Hacker (C|EH) certification, to address the global demand for a qualified cybersecurity workforce.
The course provides an overview of the Management Accounting capabilities in SAP S/4HANA compared to SAP ERP. This course addresses consultants that are experienced in SAP ERP Management Accounting. You will learn how to configure and use the most important business processes.
The course provides an overview of the Management Accounting capabilities in SAP S/4HANA compared to SAP ERP. This course addresses consultants that are experienced in SAP ERP Management Accounting. You will learn how to configure and use the most important business processes.
The Certified Chief Information Security Officer (CCISO) is a professional certification by EC-Council for experienced information security leaders. Focusing on key domains like governance, risk management, and strategic planning, it equips cybersecurity professionals with leadership skills needed to manage an organization's information security effectively. The CCISO is globally recognized, ideal for senior security roles and those aspiring to executive
positions.
In this course, you will acquire in-depth knowledge of the advanced features in ABAP programming and understand how to apply them practically in your ABAP applications.
Through a combination of lecture and hands-on labs, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. The course also gives you a foundation in network programmability, automation and software-defined networking.
This course is the recommended entry point to the SAP S/4HANA curriculum for SAP Business Suite professionals/learners with SAP Business Suite/ERP background. For learners without previous SAP experience, the S4H00 "SAP S/4HANA Overview" course is recommended.
This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution.
In this course, you will learn about the fundamental business processes in SAP S/4HANA Sales, including how to perform the most important functions from presales to receipt of customer payment. You will also learn about the key master data in this area. The course also touches on integration with the areas of materials management, manufacturing (make-to-order process) and financial accounting.
This course will provide you with a detailed understanding of production planning in SAP S/4HANA handled via FIORI frontend. To learn how to plan using PP/DS, register for course S4224 in addition.
This course is the recommended entry point to the SAP S/4HANA curriculum for SAP Business Suite professionals/learners with SAP Business Suite/ERP background. For learners without previous SAP experience, the S4H00 "SAP S/4HANA Overview" course is recommended.
An IT architect is an expert who prepares high-level solutions for business applications, systems, portfolios, infrastructures or the entire enterprise. It develops IT services and solutions for businesses and organizations and often designs and manages communications, security, networking, storage, etc.
In this course the key logistical business processes are discussed that can be found within SAP S/4HANA Enterprise Management. Demand planning, material requirements planning and (embedded) SAP S/4HANA Production Planning and Detailed Scheduling are discussed. There is also focus on the execution processes: external procurement and inventory management, (discrete) production, (embedded) SAP Extended Warehouse Management, order fulfillment and (embedded) SAP
Transportation Management. Real- time analytics and possible conversion scenarios are also discussed.
This course is the recommended entry point to the SAP S/4HANA curriculum for SAP Business Suite professionals/learners with SAP Business Suite/ERP background. For learners without previous SAP experience, the S4H00 "SAP S/4HANA Overview" course is recommended.
This course is the recommended entry point to the SAP S/4HANA curriculum for SAP Business Suite professionals/learners with SAP Business Suite/ERP background. For learners without previous SAP experience, the S4H00 "SAP S/4HANA Overview" course is recommended.
This course will discuss the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI.
Social Media
Live Contact