2.103 zoekresultaten voor "*"
Red Hat OpenShift Development I: Introduction to Containers with Podman [DO188]
OVERVIEW A developer introduction to building and managing containers with Podman for deploying applications on Red Hat OpenShift. Red Hat …
Business Analysis: Essentials - Inclusief ECBA Examen [GK2919]
OVERVIEW In this training you'll learn the vocabulary standards and business analysis practices through the use of the IIBA A Guide to the …
Information Security Foundation (ISFS) based on IEC/ISO 27001 - Inclusief Examen [ISF-EXIN]
OVERVIEW Informatiebeveiliging wordt steeds belangrijker. De globalisering van de economie leidt tot een toenemende uitwisseling van inform…
Persoonlijke effectiviteit met NLP: introductietraining [NLP-B]
OVERVIEW NLP (Neurolinguïstisch Programmeren) biedt technieken om gedrag van mensen te analyseren en op doeltreffende wijze te verbeteren. …
Critical Thinking Problem Solving and Decision Making [GK2895]
OVERVIEW Improve your decision-making capabilities through critical thinking, structured reasoning, and creative problem analysis. Learn ho…
ISO/IEC 27001:2022 Information Security: Lead Auditor (PECB certified) - Inclusief Examen [ISO27001LA]
OVERVIEW The PECB ISO/IEC 27001 Lead Auditor training course is designed to prepare you to audit an information security management system …
Splunk Enterprise Data Administration (SEDA)
Prerequisites To be successful, students must have completed these Splunk Education course(s) or have equivalent working knowledge: Intro t…
Automate your Workflow with GitHub Actions (GH-200T00) Online
Course Content Automate development tasks by using GitHub Actions Build continuous integration (CI) workflows by using GitHub Actions Build…
Observability Foundation (OBSF)
Course Content Course Introduction Module 1: Exploring Observability What is Observability? MELT Importance of Observability Why Traditiona…
Introduction to Microsoft Power Platform (PL-900T00) Online
Course Content Describe the business value of Microsoft Power Platform Manage the Microsoft Power Platform environment Demonstrate the capa…
Defend against cyberthreats with Microsoft Defender XDR (SC-5004)
Course Content Mitigate incidents using Microsoft Defender Learn how the Microsoft Defender portal provides a unified view of incidents fro…
Workspace ONE Deploy and Manage (WODAM)
Prerequisites This course has no Prerequisites Who Should Attend Systems Engineers Consulting Architects Microsoft End-User Computing Speci…
Analyzing and Visualizing Data in Looker (AVDL)
Who Should Attend Business users who need to draw insights from data. Data analysts who are responsible for data analysis and visualization…
DevSecOps Foundation (DSOF)
Course Content Realizing DevSecOps Outcomes Origins of DevOps Evolution of DevSecOps CALMS The Three Ways Defining the Cyberthreat Lands…
ONTAP Data Protection Administration (DATAPROT9)
Course Content This intermediate-level course introduces key concepts and techniques for protecting data on NetApp® ONTAP® based systems. Y…