Virtual Instructor-Led Training
Get certified or simply improve your skills with our virtual Instructors.
Categories
- Agile
- AI/ML
- All Courseware
- Application & Infrastructure
- Application and Infrastructure
- Business Analysis
- Cloud
- Data & Analytics
- Design Multimedia
- Developer
- DevOps
- End User Application
- IT Service Management
- Leadership & Professional Development
- Modern Workplace
- Networking & Wireless
- Networking and Wireless
- Office Applications
- Programming
- Project Management
- Security
- Virtualization
- Workplace Fundamentals
Vendors
- Adobe
- Agile
- Amazon
- Business Analysis
- Business Process
- CertNexus
- Cisco
- CMMC
- CompTIA
- Crystal Reports
- CyberSecurity Professionals
- Development
- DevOps Institute
- EC-Council
- ISACA
- ISC2
- Java
- JavaScript
- Leadership & Professional Development
- Microsoft
- Microsoft Apps
- Microsoft Technical
- PeopleCert
- PMI
- Project Management
- Python
- Red Hat
- Scrum
- SHRM
- Six Sigma
- Tableau
- VMware
- Web Development
- Workplace Fundamentals
5 days
CompTIA
CompTIA’s Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration.
The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies.
The Official CompTIA® Network+® (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career.- 5 Days Course
- Online or in-class
$2,475.00 – $2,495.00CompTIA
Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.- 5 Days Course
- Online or in-class
$3,295.00CompTIA
In this course, students will apply recognized practices of project management and understand a project’s life cycle and roles and skills necessary to effectively initiate, plan, execute, monitor and control, and close a project.- 5 Days Course
- Online or in-class
$2,475.00 – $2,495.00CompTIA
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn.
CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs.
- 5 Days Course
- Online or in-class
$2,475.00 – $2,495.00CompTIA
This course builds on existing professional experience with personal computer hardware support to present the next tier of skills & concepts students will use on the job when administering any type of network server.- 5 Days Course
- Online or in-class
$2,475.00 – $2,495.00CertNexus
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT’s National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination, NIST 800.171r2 (Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations). It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.
This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation.
Purchase of this course includes the associated exam voucher.- 5 Days Course
- Online or in-class
$3,495.00Red Hat
Advance your Ansible skills and develop automation that scales by applying recommended practices with the new, container focused tools from Red Hat Ansible Automation Platform
Developing Advanced Automation with Red Hat Ansible Automation Platform (DO374) is designed for automation content developers to leverage the new, container focused tools from Red Hat® Ansible Automation Platform to efficiently develop automation that can be managed by the automation controller. Learn recommended practices for automation development using reusable code, advanced playbook techniques, shared execution environments, and preparing for scalable automation with the automation content navigator.
This course is based on Red Hat Ansible Automation Platform 2.2.- 5 Days Course
- Online or in-class
$4,280.00EC-Council
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.- 5 Days Course
- Online or in-class
$3,495.00EC-Council
EC-Council’s C|HFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. Establishing the forensics process, lab, evidence handling procedures, and investigation techniques are required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.
This intense hands-on digital forensics program immerses students in over 68 forensic labs, working on crafted evidence files utilizing the tools of the world’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics, covering current topics in cloud forensics, mobile and IoT, and investigating web application attacks and malware forensics. The C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence. Students learn various forensic investigation techniques and standard forensic tools. As they learn how to acquire and manage evidence through various operating environments, students also learn the chain of custody and legal procedures required to preserve evidence and ensure it is admissible in court, enabling the eventual prosecution of cyber criminals and containing liability on the victim organization.
- 5 Days Course
- Online or in-class
$3,495.00Red Hat
Teaches the essential skills required to design, implement, and manage a Red Hat OpenShift Data Foundation cluster and perform day-to-day Kubernetes storage management tasks.
Traditional storage options available to Kubernetes administrators are limited and lack flexibility and/or versatility. Red Hat OpenShift Data Foundation provides real advantages, even when it is backed by cloud storage such as AWS EBS and sophisticated on-prem legacy storage like SAN arrays. Many companies rely on third-party solutions to manage backup and disaster recovery in production. However, proper planning to implement these solutions requires knowledge of the Kubernetes CSI and OAPD APIs. This course walks the student through the recommended steps of configuring and managing storage services for container and Kubernetes services.
- 5 Days Course
- Online or in-class
$4,280.00Cisco
The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco® Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This 5-day hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.- 5 Days Course
- Online or in-class
$3,995.00Java
This is a five-day, comprehensive, and hands-on training course geared for developers who have little or no prior working knowledge of object-oriented programming languages, such as those working on C, COBOL, 4GL, etc.- 5 Days Course
- Online or in-class
$3,495.00
CompTIA
CompTIA’s Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration.
The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies.
The Official CompTIA® Network+® (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career.- 5 Days Course
- Online or in-class
$2,475.00 – $2,495.00CompTIA
Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company.- 5 Days Course
- Online or in-class
$3,295.00CompTIA
In this course, students will apply recognized practices of project management and understand a project’s life cycle and roles and skills necessary to effectively initiate, plan, execute, monitor and control, and close a project.- 5 Days Course
- Online or in-class
$2,475.00 – $2,495.00CompTIA
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn.
CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs.
- 5 Days Course
- Online or in-class
$2,475.00 – $2,495.00CompTIA
This course builds on existing professional experience with personal computer hardware support to present the next tier of skills & concepts students will use on the job when administering any type of network server.- 5 Days Course
- Online or in-class
$2,475.00 – $2,495.00CertNexus
This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT’s National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination, NIST 800.171r2 (Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations). It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization.
This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation.
Purchase of this course includes the associated exam voucher.- 5 Days Course
- Online or in-class
$3,495.00Red Hat
Advance your Ansible skills and develop automation that scales by applying recommended practices with the new, container focused tools from Red Hat Ansible Automation Platform
Developing Advanced Automation with Red Hat Ansible Automation Platform (DO374) is designed for automation content developers to leverage the new, container focused tools from Red Hat® Ansible Automation Platform to efficiently develop automation that can be managed by the automation controller. Learn recommended practices for automation development using reusable code, advanced playbook techniques, shared execution environments, and preparing for scalable automation with the automation content navigator.
This course is based on Red Hat Ansible Automation Platform 2.2.- 5 Days Course
- Online or in-class
$4,280.00EC-Council
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.- 5 Days Course
- Online or in-class
$3,495.00EC-Council
EC-Council’s C|HFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. Establishing the forensics process, lab, evidence handling procedures, and investigation techniques are required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.
This intense hands-on digital forensics program immerses students in over 68 forensic labs, working on crafted evidence files utilizing the tools of the world’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics, covering current topics in cloud forensics, mobile and IoT, and investigating web application attacks and malware forensics. The C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence. Students learn various forensic investigation techniques and standard forensic tools. As they learn how to acquire and manage evidence through various operating environments, students also learn the chain of custody and legal procedures required to preserve evidence and ensure it is admissible in court, enabling the eventual prosecution of cyber criminals and containing liability on the victim organization.
- 5 Days Course
- Online or in-class
$3,495.00Red Hat
Teaches the essential skills required to design, implement, and manage a Red Hat OpenShift Data Foundation cluster and perform day-to-day Kubernetes storage management tasks.
Traditional storage options available to Kubernetes administrators are limited and lack flexibility and/or versatility. Red Hat OpenShift Data Foundation provides real advantages, even when it is backed by cloud storage such as AWS EBS and sophisticated on-prem legacy storage like SAN arrays. Many companies rely on third-party solutions to manage backup and disaster recovery in production. However, proper planning to implement these solutions requires knowledge of the Kubernetes CSI and OAPD APIs. This course walks the student through the recommended steps of configuring and managing storage services for container and Kubernetes services.
- 5 Days Course
- Online or in-class
$4,280.00Cisco
The Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 course teaches you to deploy and use Cisco® Identity Services Engine (ISE) v3.x, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This 5-day hands-on course provides you with the knowledge and skills to implement and apply Cisco ISE capabilities to support use cases for Zero Trust security posture. These use cases include tasks such as policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and Terminal Access Controller Access Control Server (TACACS+) device administration. Through hands-on practice via lab exercises, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.- 5 Days Course
- Online or in-class
$3,995.00Java
This is a five-day, comprehensive, and hands-on training course geared for developers who have little or no prior working knowledge of object-oriented programming languages, such as those working on C, COBOL, 4GL, etc.- 5 Days Course
- Online or in-class
$3,495.00