20 horas
Resultados para " Windows "
Búsqueda de instructores
VMware Horizon 8: Deploy and Manage
25 horas
VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track
25 horas
VMware Horizon 8: Skills for Virtual Desktop Management
15 horas
VMware Horizon 8: Troubleshooting Bootcamp
25 horas
VMware Horizon 8: Virtual Desktop Bootcamp
25 horas
VMware Horizon 8: Virtual Desktop Troubleshooting
10 horas
Designing, Implementing, and Managing IBM MQ V9 Clusters
15 horas
Developing Rule Solutions in IBM Operational Decision Manager V8.10
25 horas
Developing Rule Solutions in IBM Operational Decision Manager V8.9.2
10 horas
ADMINISTRACIÓN MICROSOFT 365
20 horas
VMware vSphere: What’s New [V6.7 to V7]
15 horas
VMware Workspace ONE: Unified Endpoint Management Troubleshooting
10 horas
VPN Redes Privadas Virtuales
25 horas
DevOps Engineering on AWS
15 horas
VMware Horizon Mirage: Install, Configure, Manage
15 horas
Administering a SQL Database Infrastructure
25 horas
DB2 Family Fundamentals
This course provides you with information about the functions of IBM’s DB2, a relational database manager which may be installed under a variety of operating systems on many hardware platforms.
DB2 runs under the z/OS, VM, Linux, UNIX, and Windows operating systems, to name a few.
The course includes discussion of how the DB2 products provide services. The focus is on the services DB2 provides and how we work with DB2, not on its internal workings.
Learning Journeys or Training Paths that reference this course:
Data Servers Cross Product Overview
DB2 for z/OS
Db2 for z/OS – Role: Application Programmer
Db2 for z/OS – Role: Database Administrator
Db2 for z/OS – Role: System Administrator
Application Programming
DB2 for LUW Performance Tuning and Monitoring Workshop
Learn how to tune for optimum performance the IBM DB2 10 for Linux, UNIX, and Windows relational database management system and associated applications written for this environment. Learn about DB2 10 for Linux, UNIX, and Windows in a single partition database environment. Explore performance issues affecting the design of the database and applications using the database, the major database performance parameters, and the different tools that assist in performance monitoring and tuning.
Use tools in class that are common across the Linux, UNIX, and Windows environments. During labs running on DB2 10.1, develop your ability to use monitoring tools. Explain tools and DB2 utilities like RUNSTATS, REORG and db2batch to tune a database running on your local LINUX workstation.
Learning Journeys or Training Paths that reference this course:
Db2 – Role: Database Administrator
Designing Self-Service Business Intelligence and Big Data Solutions
Este curso de cinco días dirigido por un instructor enseña a los estudiantes a implementar soluciones de Business Intelligence (BI) y de análisis de Big Data utilizando la plataforma de datos de Microsoft. El curso discute los fundamentos del BI de autoservicio y describe cómo usar Microsoft SQL Server Reporting Services, Microsoft Excel, Microsoft SharePoint Server y Microsoft Office 365 Power BI para crear modelos de datos e informes de autoservicio. A continuación, el curso describe cómo usar Windows Azure HDInsight para realizar análisis de datos grandes.
Nota: Este curso está diseñado para clientes que estén interesados en aprender SQL Server 2012 o SQL Server 2014. Cubre las nuevas características de SQL Server 2014, pero también las importantes capacidades de la plataforma de datos de SQL Server.
Developing ASP.NET MVC 5 Web Applications
En este curso, los estudiantes aprenderán a desarrollar aplicaciones avanzadas ASP.NET MVC usando herramientas y tecnologías de .NET Framework 4.5. La atención se centrará en actividades de codificación que mejoren el rendimiento y la escalabilidad de la aplicación del sitio web. ASP.NET MVC se introducirá y comparará con los Formularios Web para que los estudiantes sepan cuando cada uno debe/podría ser usado. Este curso también preparará al estudiante para el examen 70-486.
Developing SQL Data Models
Este curso de tres días dirigido por un instructor está dirigido a los profesionales de bases de datos que desempeñan un papel de desarrollador de Business Intelligence (BI). Este curso examina la implementación de bases de datos multidimensionales mediante el uso de Servicios de Análisis de Servidores SQL (SSAS), y la creación de modelos de datos semánticos tabulares para el análisis con SSAS.
Developing SQL Databases
Este curso de Microsoft On-Demand proporciona a los estudiantes el conocimiento y las habilidades para desarrollar una base de datos de Microsoft SQL Server 2016. El curso MOC-OD se enfoca en enseñar a los individuos cómo usar las características y herramientas del producto SQL Server 2016 relacionadas con el desarrollo de una base de datos.
IBM DB2 SQL Workshop
This course replaces course SQL Workshop (CE120GB). This is the Classroom version of Instructor-led online course SQL Workshop – Instructor Led Online (3E121GB).
This course provides an introduction to the SQL language.
This course is appropriate for customers working in all DB2 environments, that is, z/OS, VM/VSE, iSeries, Linux, UNIX, and Windows. It is also appropriate for customers working in an Informix environment.
Learning Journeys or Training Paths that reference this course:
Data Servers Cross Product Overview
Db2 for z/OS – Role: Database Administrator
Db2 for z/OS – Role: System Administrator
Application Programming
DB2 for z/OS
Db2 for z/OS – Role: Application Programmer
IBM DB2 SQL Workshop for Experienced Users
This course teaches you how to make use of advanced SQL techniques to access DB2 databases in different environments. This course is appropriate for customers working in all DB2 environments, specifically for z/OS, Linux, UNIX, and Windows.
Learning Journeys or Training Paths that reference this course:
Data Servers Cross Product Overview
Db2 for z/OS – Role: Database Administrator
Db2 for z/OS – Role: System Administrator
Application Programming
DB2 for z/OS
Db2 for z/OS – Role: Application Programmer
IBM InfoSphere Advanced QualityStage V11.5
This course will step you through the QualityStage data cleansing process. You will transform an unstructured data source into a format suitable for loading into an existing data target. You will cleanse the source data by building a customer rule set that you create and use that rule set to standardize the data. You will next build a reference match to relate the cleansed source data to the existing target data.
Learning Journeys or Training Paths that reference this course:
Information Server – Developer Role
Managing Office 365 Identities and Requirements
This is a 5-day Instructor Led Training (ILT) course that targets the needs of IT professionals who take part in evaluating, planning, deploying, and operating Office 365 services, including its identities, dependencies, requirements, and supporting technologies. This course focuses on skills required to set up an Office 365 tenant, including federation with existing user identities, and skills required to sustain an Office 365 tenant and users. This course maps to the following two certification exams: 70-346 and 70-347.
IBM InfoSphere DataStage Essentials (v11.5)
This course enables the project administrators and ETL developers to acquire the skills necessary to develop parallel jobs in DataStage. The emphasis is on developers. Only administrative functions that are relevant to DataStage developers are fully discussed. Students will learn to create parallel jobs that access sequential and relational data and combine and transform the data using functions and other job components.
Learning Journeys or Training Paths that reference this course:
Data Integration Architect
Data Integration Developer
Information Analysis – Data Integration Architect
Information Server – Developer Role
Microsoft 365 Device Management
Este curso es una introducción al mundo de la administración de dispositivos de Microsoft 365: desde el establecimiento de Microsoft Intune hasta la inscripción de dispositivos en Intune, el monitoreo de los dispositivos y el control de lo que los usuarios pueden hacer desde los dispositivos inscritos mediante el uso de políticas de acceso condicional. Si ya está administrando dispositivos mediante una herramienta de administración de dispositivos tradicional como Configuration Manager, será interesante saber cómo pasar sin problemas a la administración moderna, en qué dispositivos administra Intune y cómo uno puede beneficiarse de la administración de dispositivos nuevos,capacidades como ser: cumplimiento, acceso condicional y piloto automático de Windows para implementar nuevos dispositivos desde la nube.
Microsoft 365 Identity and Services (EXAM MS100)
Este curso es un paquete de los 3 cursos que se presentan a continuación, impartidos en un eficiente formato de 5 días.
Gestión de la Oficina 365
Microsoft 365 Gestión de servicios e inquilinos
Gestión de identidades de Microsoft 365
Obtenga información acerca de la administración de Office 365, incluidos los componentes clave de Office 365, cómo trasladar su organización a Office 365, cómo configurar Office 365 y cómo administrar las implementaciones de Office 365 ProPlus.
Obtenga información sobre la administración de servicios y arrendatarios de Microsoft 365, incluida la forma de planificar, administrar y personalizar los servicios y arrendatarios de Microsoft 365 de su organización.
Obtenga información sobre Microsoft 365 Identity Management, incluida la gestión de grupos de seguridad de usuarios y licencias para identidades en la nube, y cómo planificar e implementar la sincronización de identidades, las identidades federadas, las aplicaciones y el acceso externo.
IBM InfoSphere QualityStage Essentials 11.3
This course teaches how to build QualityStage parallel jobs that investigate, standardize, match, and consolidate data records. Students will gain experience by building an application that combines customer data from three source systems into a single master customer record.
Learning Journeys or Training Paths that reference this course:
Information Server – Developer Role
Microsoft 365 Mobility and Security (EXAM MS101)
Este curso es un paquete de los 3 cursos que se indican a continuación, impartidos en un eficiente formato de 4 días.
Gestión de la seguridad de Microsoft 365
Gestión de cumplimiento de Microsoft 365
Administración de dispositivos de Microsoft 365
Obtenga información acerca de la administración de seguridad Microsoft 365, incluyendo cómo administrar sus métricas de seguridad, cómo habilitar Azure AD Identity Protection, cómo configurar sus servicios de seguridad Microsoft 365 y cómo utilizar Microsoft 365 Threat Intelligence.
Obtenga más información acerca de la administración del cumplimiento de Microsoft 365, incluidas las soluciones de retención y prevención de pérdida de datos en Microsoft 365, el archivado y la retención en Microsoft 365, la implementación y la administración de la gobernanza de datos y la administración de las búsquedas e investigaciones.
Conozca el mundo de la administración de dispositivos de Microsoft 365: desde el establecimiento de Microsoft Intune, pasando por la inscripción de dispositivos en Intune, hasta la supervisión de los dispositivos y el control de lo que los usuarios pueden hacer desde los dispositivos inscritos mediante el uso de políticas de acceso condicional. Si ya está gestionando dispositivos mediante una herramienta tradicional de gestión de dispositivos como Configuration Manager, le interesará saber cómo puede pasar sin problemas a la gestión moderna, en qué dispositivos gestiona Intune y cómo puede beneficiarse de las nuevas capacidades de gestión de dispositivos, como el cumplimiento de normativas, el acceso condicional y el piloto automático de Windows para desplegar nuevos dispositivos desde la nube.
Microsoft 365 Security Administrator
In this course you will learn how to secure user access to your organization’s resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces you to conditional access in Microsoft 365. You will learn about threat protection technologies that help protect your Microsoft 365 environment. Specifically, you will learn about threat vectors and Microsoft’s security solutions to mitigate threats.
You will learn about Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, and threat management. In the course you will learn about information protection technologies that help secure your Microsoft 365 environment. The course discusses information rights managed content, message encryption, as well as labels, policies and rules that support data loss prevention and information protection. Lastly, you will learn about archiving and retention in Microsoft 365 as well as data governance and how to conduct content searches and investigations. This course covers data retention policies and tags, in-place records management for SharePoint, email retention, and how to conduct content searches that support eDiscovery investigations.
Microsoft Azure Architect Design
Este curso enseña a los Solutions Architects cómo traducir los requerimientos de los negocios en soluciones seguras, escalables y confiables. Este curso trata aspectos como el diseño de registro, el análisis de costes, la autenticación y la autorización, el gobierno, la seguridad, el almacenamiento, la alta disponibilidad y la migración. Esta función requiere decisiones en múltiples áreas que afectan a una solución de diseño global.
Implementing a SQL Data Warehouse
Este curso de cinco días dirigido por un instructor proporciona a los estudiantes el conocimiento y las habilidades para aprovisionar una base de datos de Microsoft SQL Server 2016. El curso cubre el aprovisionamiento de SQL Server 2016 tanto in situ como en Azure, y cubre la instalación desde una instalación nueva y la migración desde una instalación existente.
Microsoft Azure Architect Technologies
Este curso enseña a los arquitectos de soluciones cómo traducir los requisitos comerciales en soluciones seguras, escalables y confiables. Este curso describe cómo las decisiones en cada área de tesis afectan una solución general. Los contenidos de este curso incluyen:
Virtualización
Automatización
Redes
Almacenamiento
Identidad
Seguridad
Plataforma de datos
Infraestructura de aplicaciones.
Microsoft Azure technologies for AWS Architects
Este curso enseña a los arquitectos de soluciones que han diseñado previamente para Amazon Web Services cómo traducir los requisitos comerciales en soluciones seguras, escalables y confiables para Azure. Las lecciones incluyen virtualización, automatización, redes, almacenamiento, identidad, seguridad, plataforma de datos e infraestructura de aplicaciones. Este curso describe cómo las decisiones en cada una de estas áreas afectan a una solución general.
Performance Tuning and Optimizing SQL Databases
Este curso de cuatro días dirigido por un instructor proporciona a los estudiantes que gestionan y mantienen bases de datos de SQL Server los conocimientos y habilidades para ajustar y optimizar el rendimiento de sus bases de datos.
Planning and Administering SharePoint 2016
Este curso de cinco días le proporcionará el conocimiento y las habilidades para planificar y administrar un entorno de Microsoft SharePoint 2016. El curso le enseña cómo implementar, administrar y solucionar problemas en su entorno de SharePoint. Este curso también proporciona directrices, prácticas recomendadas y consideraciones que le ayudarán a optimizar la implementación de SharePoint.
Este es el primero de una secuencia de dos cursos para profesionales de TI y está alineado con la certificación de SharePoint 2016 IT Pro.
Programming in HTML5 with JavaScript and CSS3
Este curso proporciona una introducción a HTML5, CSS3 y JavaScript. Este curso ayuda a los estudiantes a obtener conocimientos básicos de programación HTML5/CSS3/JavaScript. Este curso es un punto de entrada en las rutas de capacitación de aplicaciones Web y aplicaciones de Windows Store. El curso se centra en el uso de HTML5/CSS3/JavaScript para implementar la lógica de programación, definir y utilizar variables, realizar bucles y ramificaciones, desarrollar interfaces de usuario, capturar y validar las entradas del usuario, almacenar datos y crear aplicaciones bien estructuradas.
Los escenarios de laboratorio en este curso se seleccionan para apoyar y demostrar la estructura de varios escenarios de aplicación. Están pensados para centrarse en los principios y componentes/estructuras de codificación que se utilizan para establecer una aplicación de software HTML5.
Este curso utiliza Visual Studio 2012, ejecutándose en Windows 8
Provisioning SQL Databases
Este curso está diseñado para enseñar a los estudiantes cómo aprovisionar bases de datos de SQL Server tanto en las instalaciones como en SQL Azure.
Office 365 Administration (GK Exclusive)
Presentamos la próxima generación de computación basada en la nube, Microsoft Office 365: La solución integrada en línea basada en la nube para empresas de cualquier tamaño. Desde un único portal fácil de gestionar, los usuarios y los administradores asignados pueden gestionar todos los aspectos de su negocio utilizando herramientas conocidas como SharePoint On-Line, Exchange On-line y Lync para proporcionar a los usuarios una plataforma de colaboración fácil de usar sin costes de equipos o infraestructura costosos.
Este curso de nivel 400 le ofrece una experiencia real utilizando un entorno de caja de arena que funciona como su backoffice habitual, desde el cual, por ejemplo, Active Directory se integrará con los componentes de Office 365 en línea. Este entorno sandbox estará disponible para los delegados durante un cierto periodo de tiempo después de terminar el curso para continuar con el proceso de aprendizaje.
Querying Data with Transact-SQL
Este curso está diseñado para introducir a los estudiantes a Transact-SQL. Está diseñado de tal manera que los primeros tres días pueden ser enseñados como un curso a los estudiantes que requieren el conocimiento para otros cursos en el currículo de SQL Server. Los días 4 y 5 se enseñan las habilidades restantes requeridas para tomar el examen 70-761.
Office 365 Administration and Troubleshooting
Se trata de un curso de tres días de duración que se centra en las necesidades de los profesionales de la tecnología de la información (TI) que participan en la administración, configuración, resolución de problemas y funcionamiento de los servicios de Office 365, incluidas sus identidades, dependencias, requisitos y tecnologías de apoyo. Este curso se centra en las habilidades necesarias para administrar y solucionar problemas del Office 365 y de los servicios clave de Office 365, como Exchange Online, SharePoint Online y Skype para empresas. También cubre las características de seguridad y cumplimiento de Office 365.
Querying Microsoft SQL Server® 2014
Este curso de 5 días dirigido por un instructor proporciona a los estudiantes las habilidades técnicas necesarias para escribir consultas Transact-SQL básicas para Microsoft SQL Server 2014. Este curso es la base de todas las disciplinas relacionadas con SQL Server; a saber, Administración de Bases de Datos, Desarrollo de Bases de Datos y Business Intelligence. El objetivo principal del curso es preparar a las personas para el examen «70-461″: Escritura de consultas usando Microsoft® SQL Server® 2014 Transact-SQL». Este examen será el examen subyacente para todas las disciplinas relacionadas con SQL Server; a saber, Administración de Bases de Datos, Desarrollo de Bases de Datos y Business Intelligence. Como tal, el principal público objetivo de este curso es: Administradores de bases de datos, desarrolladores de bases de datos y profesionales de BI. Nota: Este curso está diseñado para clientes que están interesados en aprender SQL Server 2012 o SQL Server 2014. Cubre las nuevas características de SQL Server 2014, pero también las importantes capacidades de la plataforma de datos SQL Server.
Office 365 Administrator
This is a five-day instructor-led training (ILT) course that targets the needs of IT professionals who take part in evaluating, planning, deploying, and operating Microsoft Office 365 services, including its identities, dependencies, requirements, and supporting technologies. This course focuses on skills required to set up an Office 365 tenant, including federation with existing user identities, and skills required to sustain an Office 365 tenant and its users.
ServiceNow Configuration Management Database (CMDB) Fundamentals
Learn the basic skills required to effectively design, configure, populate, and maintain the health of the ServiceNow CMDB.
This course has been designed to provide ServiceNow administrators, implementers, and architects with the basic skills required to effectively design, configure, populate, and maintain the health of the ServiceNow CMDB.
The course is based off the content of the CMDB Fundamentals eLearning currently available on NOW Learning. The course is designed to encourage student participation that will include individual and group planning and discussions plus hands on configuration led by an experienced ServiceNow CMDB facilitator.
During this three-day interactive training course, students need to register on NOW Learning for the Configuration Management Database Fundamentals eLearning course as this will act as the student online guide for the course.
Attendees will have access to the NOW platform using an individual student instance, which is a “safe sandbox” plus receive a Windows Server that acts as a MID Server with access to targets used to run Discovery and Service Mapping. In addition, students receive simulator instances to work through a series of tasks designed to reinforce CMDB Configuration and Health principals.
Curso Remoto (Abierto)
Nuestra solución de formación remota o virtual, combina tecnologías de alta calidad y la experiencia de nuestros formadores, contenidos, ejercicios e interacción entre compañeros que estén atendiendo la formación, para garantizar una sesión formativa superior, independiente de la ubicación de los alumnos.
Planning and Administering Microsoft Azure for SAP Workloads
Este curso enseña a los profesionales de TI con experiencia en soluciones SAP cómo aprovechar los recursos de Azure que incluyen la implementación y configuración de máquinas virtuales, redes virtuales, cuentas de almacenamiento y Azure AD que incluye la implementación y administración de identidades híbridas. Los estudiantes de este curso aprenderán a través de conceptos, escenarios, procedimientos y laboratorios prácticos cómo planificar mejor e implementar la migración y operación de una solución SAP en Azure. Recibirá orientación sobre suscripciones, creará y escalará máquinas virtuales, implementará soluciones de almacenamiento, configurará redes virtuales, realizará copias de seguridad y compartirá datos, conectará Azure y sitios locales, administrará el tráfico de red, implementará el directorio activo de Azure asegurará las identidades y supervisará su solución.
Updating Your Skills to SQL Server 2016
Este curso de tres días, dirigido por un instructor, proporciona a los estudiantes que se trasladan desde versiones anteriores de SQL Server una introducción a las nuevas características de SQL Server 2016.
Updating Your Skills to SQL Server 2017
Este curso de dos días dirigido por un instructor está dirigido a los profesionales de la base de datos que buscan actualizar sus habilidades para cubrir SQL Server 2017.
Developing SQL Databases
Este curso de Microsoft On-Demand proporciona a los estudiantes el conocimiento y las habilidades para desarrollar una base de datos de Microsoft SQL Server 2016. El curso MOC-OD se enfoca en enseñar a los individuos cómo usar las características y herramientas del producto SQL Server 2016 relacionadas con el desarrollo de una base de datos.
Performance Tuning and Optimizing SQL Databases
Este curso de cuatro días dirigido por un instructor proporciona a los estudiantes que gestionan y mantienen bases de datos de SQL Server los conocimientos y habilidades para ajustar y optimizar el rendimiento de sus bases de datos.
Security in Google Cloud
This course gives participants broad study of security controls and techniques on Google Cloud. Through lectures, demonstrations, and hands-on labs, participants explore and deploy
the components of a secure GCP solution. Participants also learn mitigation techniques for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service
attacks, phishing attacks, and threats involving content classification and use.
ServiceNow Cloud Provisioning and Governance Fundamentals
Many Enterprises leverage a virtualization and multi cloud strategy that includes vendors such as AWS, Azure, Google, IBM and VMware. The numerous benefits of a multi cloud strategy are often offset by complexity, a lack of visibility and an inability to control cost. The ServiceNow Cloud Provisioning and Governance Platform helps to remove the complexity of multi cloud use, provides visibility and makes it easy for End Users to consume cloud resources.
This 3-day class will teach attendees how to deploy and configure the ServiceNow Cloud Provisioning and Governance Platform to create multi cloud experience that makes it easy for end users to consume resources from AWS, Azure and VMware. The course will also show attendees how to use the Cloud Provisioning and Governance application to apply governance and policies to control the use and consumption of cloud resources.
Upon completion of the course, students will have gained experience in how to setup a Cloud User Portal, how to deploy simple application stacks using native cloud templating technologies and Terraform. The course will also teach students how to control cloud sprawl by using Cloud Provisioning and Governance approval policies, resource profiles and capacity limits.
Systems Operations on AWS
Systems Operations on AWS está diseñado para enseñar a los responsables de la administración de sistemas y a los equipos de DevOps a crear implementaciones automatizadas y repetibles de redes y sistemas en la plataforma de AWS. En este curso se tratarán las características y herramientas específicas de AWS relacionadas con la configuración y la implementación, así como técnicas comunes utilizadas en el sector para configurar e implementar sistemas.
Curso Remoto (Abierto)
Nuestra solución de formación remota o virtual, combina tecnologías de alta calidad y la experiencia de nuestros formadores, contenidos, ejercicios e interacción entre compañeros que estén atendiendo la formación, para garantizar una sesión formativa superior, independiente de la ubicación de los alumnos.
Certified Ethical Hacker + Examen
A Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems. A Ethical Hacker uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident.
CEH was built to incorporate a hands-on environment and systematic process across everyethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.
The Certified Ethical Hacker course is regularly updated to ensure you are aware of the latest tools and techniques used by hackers and information security professionals.
Looking to obtain the CEH Master Accreditation, then why not purchase the CEH Pratical Exam aas well CEH Exam + CEH Practical Exam = CEH Master
A Pearson Vue exam voucher is included, although you will need to schedule the exam at a Pearson Vue testing faclity. An additional 6 months access to the CEHv11 (iLabs) is provided once you have completed the course.
VMware Carbon Black App Control Advanced Administrator
This one-day course teaches you how to configure and scope the rules within VMware Carbon Black® App ControlTM product to maintain the system according to your organization’s security posture and organizational policies. Additionally, this course covers troubleshooting both the server and the agent for Carbon Black App Control and how to identify issues that impact normal operations. This course provides an in-depth, technical understanding of the Carbon Black App Control product through comprehensive coursework and hands-on scenario-based labs.
Product Alignment
VMware Carbon Black App Control
Certified Information Systems Auditor
ISA® is a trademark of the Information Systems Audit and Control Association® (ISACA®)
More than 60,000 security professionals hold CISA certification, which was awarded the «Best Professional Certification» for 2009 by SC Magazine. Global Knowledge was also recognized for the fourth year in a row as a finalist for the «Best Professional Training Program.» Join the elite ranks of the CISA certified with the help of our CISA Prep training course.
In this course, you’ll cover all six domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security. Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.
Certified Penetration Testing Professional
EC-Council’s Certified Penetration Tester (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
The CPENT range consists of entire network segments that replicate an enterprise network — this is not a computer game simulation; this is an accurate representation of an enterprise network that will present the latest challenges to the pen tester. The benefit of hands on learning in a live cyber range is that candidates will encounter multiple layers of network segmentation, and the CPENT course will teach candidates how to navigate these layers, so that once access is gained in one segment, a candidate will know the latest pivoting techniques required to reach the next. However, that won’t be enough on its own as the targets and segments are progressive in nature, so once you get into one machine and or segment, the next one will challenge you even more
CPENT is a fully online, remotely proctored practical exam that challenges candidates through a grueling 24-hour performance-based, hands-on exam. The exam is broken into 2 practical exams of 12-hours each that will test your perseverance and focus by forcing you to outdo yourself with each new challenge. Candidates have the option to choose either 2 12-hour exams or one 24-hour exam.
Candidates who score more than 70% will earn the CPENT certification. Candidates who score more than 90% attain the prestigious LPT (Master) credential!
Certified Threat Intelligence Analyst + Examen
Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program that teaches a structured approach for building effective threat intelligence.
The program was based on a rigorous Job Task Analysis (JTA) of the job roles involved in the field of threat intelligence. This program differentiates threat intelligence professionals from other information security professionals. It is a highly interactive, comprehensive, standards-based, intensive 3-day training program that teaches information security professionals to build professional threat intelligence.
More than 40 percent of class time is dedicated to the learning of practical skills, and this is achieved through EC-Council labs. Theory to practice ratio for C|TIA program is 60:40, providing students with a hands-on experience of the latest threat intelligence tools, techniques, methodologies, frameworks, scripts, etc. C|TIA comes integrated with labs to emphasize the learning objectives.
The C|TIA lab environment consists of the latest operating systems including Windows 10 and Kali Linux for planning, collecting, analyzing, evaluating, and disseminating threat intelligence.
Cisco Identity Services Engine Essentials
In this course, you will learn about the Cisco Identity Services Engine (ISE) a next-generation identity and access control policy platform that provides a single policy plane across the entire organization combining multiple services, including authentication, authorization, and accounting (AAA) using 802.1x and MAB. The training provides learners with the knowledge and skills to implement 802.1X and MAB for wired and wireless endpoints. The class focuses on configuring Network Access Devices (IOS switches, and Wireless Lan Controllers) with commands necessary for ISE integration. The class also covers configuration of endpoints to use the native Microsoft supplicant with PEAP and EAP-TLS, as well as the Cisco NAM supplicant with EAP-FAST. Time is taken to explore Microsoft Active Directory group policy for endpoint configuration, and to cover integration of an enterprise CA for certificate based authentication.
This course is an intensive hands-on experience. With enhanced hands-on labs, you will setup and patch an ISE node, and use and enterprise CA to configure certificate services for use in a distributed deployment. You will integrate ISE with Active Directory and configure Group Policy to automatically enroll endpoints with an enterprise CA for TLS based authentication. You will configure and test AAA and 802.1X on an IOS switch using classical commands to integrate with ISE. You will migrate and test an IOS switch configuration to use the new-mode IBNS 2.0 Cisco Common Classification Policy Language (C3PL). You will configure and test a Cisco Wireless LAN Controller (WLC) with advanced ISE features. The class also covers the new ISE 2.3 conditions studio and its use in Policy Sets for Authentication/Authorization rules, Profiling of endpoints on the network, and Device Administration using TACACS+.
VMware Carbon Black Portfolio: Configure and Manage
This 5-day course teaches you how to install, configure, and manage the VMware Carbon Black® Portfolio suite of products, which include:
VMware Carbon Black® App Control™ Administrator
VMware Carbon Black® EDR™ Administrator
VMware Carbon Black Cloud Endpoint™ Standard
VMware Carbon Black® Cloud Audit and Remediation
VMware Carbon Black® Cloud Enterprise EDR™
You learn how to use the capabilities of the products according to the organization’s security posture and organizational policies. This course provides an in-depth, technical understanding of the Carbon Black Portfolio through comprehensive coursework, hands-on labs, and scenario-based exercises.
Product Alignment
VMware Carbon Black App Control
VMware Carbon Black EDR
VMware Carbon Black Cloud Endpoint Standard
VMware Carbon Black Cloud Endpoint Advanced
VMware Carbon Black Cloud Endpoint Enterprise
VMware Carbon Black Cloud Audit and Remediation
VMware Horizon 8: Deploy and Manage
VMware Horizon 8: Deploy and Manage is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration. This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon® 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon® Connection Server™, VMware Unified Access Gateway™, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture.
Product Alignment: VMware Horizon 8 V2006
VMware Horizon 8: Deploy and Manage plus App Volumes Fast Track
This five-day accelerated, hands-on training course is a blend of VMware Horizon® 8: Skills for Virtual Desktop Management, VMware Horizon 8: Infrastructure Administration, and VMware App Volumes™, and VMware Dynamic Environment Manager™. Eight days of content are taught in five-days of extending learning.
This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You build on your skills in configuring and managing VMware Horizon 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users.
You learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon® Connection Server™ and VMware Unified Access Gateway™. You also learn how to configure a load balancer for use with Horizon and how to establish Cloud Pod Architecture.
Additionally, you learn how to use App Volumes to deliver applications and data to desktops and users in seconds and at scale. You gain skills in managing application life cycles from installation to update and replacement. You also learn how to use Dynamic Environment Manager to provide personalization and dynamic policy configuration across virtual, physical, and cloud-based environments to simplify end-user profile management.
Product Alignment: VMware Horizon 8 v2006
VMware Horizon 8: Skills for Virtual Desktop Management
This three-day, hands-on course gives you the skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. This course builds your skills in configuring and managing VMware Horizon® 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users.
Product Alignment: VMware Horizon 8 V2006
Comptia Security+
This course is intended for those wishing to qualify with CompTIA Security+. CompTIA’s Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years’ experience whose job role is focused on system security.
This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation.
The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.
VMware Horizon 8: Virtual Desktop Bootcamp
VMware Horizon® 8: Virtual Desktop Bootcamp is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management and VMware Horizon 8: Virtual Desktop Troubleshooting. This training combination gives you the skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform.
You build skills in configuring and managing VMware Horizon 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you learn how to resolve common issues that occur in a VMware Horizon environment.
You engage in a series of lab exercises to bring existing environment issues to resolution. The exercises mirror real-world troubleshooting use cases. These exercises equip learners with the knowledge and practical skills to manage typical challenges faced by virtual desktop administrators and operators.
Product Alignment: VMware Horizon 8 v2006
VMware Horizon 8: Virtual Desktop Troubleshooting
This two-day course builds your skills in resolving common issues that occur in a VMware Horizon® environment. Students will engage in a series of lab exercises to bring existing environment issues to resolution. The exercises mirror real-world troubleshooting use cases. These exercises equip learners with the knowledge and practical skills to manage typical challenges faced by virtual desktop administrators and operators.
Product Alignment: VMware Horizon 8 2006
Cybersecurity Foundations
In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.
EC-Council Certified Incident Handler
The latest revision of EC-Council’s Certified Incident Handler (E|CIH) certified program has been designed and developed in collaboration with cybersecurity and incident handling/response practitioners across the globe.
This is a three-day course.
The ECIH program focuses on a structured approach to the incident handling and response (IH&R) process. This IH&R process includes stages such as; incident handling and response preparation, incident validation and prioritization, incident escalation and notification, forensic evidence gathering and analysis, incident containment, systems recovery, and incident eradication. This systematic incident handling and response process creates awareness among the incident responders in knowing how to respond to various types of security incidents happening in organisations today.The types of cybersecurity incidents covered include malware incidents, email security incidents, network security incidents, web application security incidents, cloud security incidents, and insider threat-related incidents.
It is a comprehensive specialist level program, that imparts knowledge and skills on how organisations can effectively handle post breach consequences by reducing the impact of the incident, both financially and reputationally. The learning objectives are emphasised through practical learning with 40% of this course covering hands-on experience of the latest incident handling and response tools, techniques, methodologies, frameworks, etc.
The E|CIH lab environment consists of the latest and patched operating systems including Windows 10, Windows Server 2016, Ubuntu Linux, and OSSIM for performing labs.
Students will have access to over 50 labs, 800 tools, and 4 OSs! as well as a large array of templates, check lists, and cheat sheets.
The ECIH Program is 100% Complaint with the NICE 2.0 Framework AND CREST Framework.
Curso Remoto (Abierto)
Nuestra solución de formación remota o virtual, combina tecnologías de alta calidad y la experiencia de nuestros formadores, contenidos, ejercicios e interacción entre compañeros que estén atendiendo la formación, para garantizar una sesión formativa superior, independiente de la ubicación de los alumnos.
EC-Council Certified Network Defender
The Certified Network Defender v2 is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program built to incorporate critical secure network skills – Protect, Detect, Respond and Predict Maps to NICE 2.0. Comes packed with the latest tools, technologies, and techniques, Deploys a hands-on approach to learning, Designed with an enhanced focus on Threat Prediction, Business Continuity and Disaster Recovery .The course is designed and developed after extensive market research and surveys.
EC-COUNCIL CERTIFIED SECURITY SPECIALIST
EC-Council Certified Security Specialist (ECSS) allows students to enhance their skills in three different areas namely information security, network security, and computer forensics.
EC-Council Certified Security Specialist (ECSS) is an entry level security program covering the fundamental concepts of information security, computer forensics, and network security. It enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.
vRealize Automation: Orchestration and Extensibility
During this five-day course, you focus on using VMware vRealize® Orchestrator™ to extend the functionality of VMware vRealize® Automation™. You learn how to provide XaaS (Anything as a Service) and implement Machine Lifecycle Extensibility using the vRealize Automation Event Broker. You also learn how to create vRealize Orchestrator workflows. Features include basic scripting implementation along with logic processing to implement a variety of functions to use in your environment. This course teaches implementing debugging, loops, conditions, and user interactions in vRealize Orchestrator.
The course introduces the new vRealize Orchestrator HTML 5 interface, along with API calls and REST functions, to give the groundwork to implement a variety of plugins and scripts. This course was designed to give you the tools to craft custom solutions in the product.
Product Alignment
VMware vSphere 6.7 U2
vRealize Automation 7.6
vRealize Orchestrator 7.6
vRealize Cloud Client 4.7.0
NSX for vSphere 6.4.4
IBM QRadar SIEM Foundations
IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned.
In this 3-day instructor-led course, you learn how to perform the following tasks:
Describe how QRadar collects data to detect suspicious activities
Describe the QRadar architecture and data flows
Navigate the user interface
Define log sources, protocols, and event details
Discover how QRadar collects and analyzes network flow information
Describe the QRadar Custom Rule Engine
Utilize the Use Case Manager app
Discover and manage asset information
Learn about a variety of QRadar apps, content extensions, and the App Framework
Analyze offenses by using the QRadar UI and the Analyst Workflow app
Search, filter, group, and analyze security data
Use AQL for advanced searches
Use QRadar to create customized reports
Explore aggregated data management
Define sophisticated reporting using Pulse Dashboards
Discover QRadar administrative tasks
Extensive lab exercises are provided to allow students an insight into the routine work of an IT Security Analyst operating the IBM QRadar SIEM platform. The exercises cover the following topics:
Architecture exercises
UI Overview exercises
Log Sources exercises
Flows and QRadar Network Insights exercises
Custom Rule Engine (CRE) exercises
Use Case Manager app exercises
Assets exercises
App Framework exercises
Working with Offenses exercises.
Search, filtering, and AQL exercises
Reporting and Dashboards exercises
QRadar Admin tasks exercises
The lab environment for this course uses the IBM QRadar SIEM 7.4 platform.
IBM Security QRadar SIEM Advanced Topics
This is an advanced course for the QRadar Analyst and Administrator and is a follow-on to BQ103G.
This course uses the IBM QRadar SIEM 7.3 platform for lab exercises.