Course Library
-
Network Automation with Ansible Fast Track
This course provides a comprehensive introduction to using Ansible for network automation and management. Ansible’s agentless nature and human-readable YAML syntax lower the barrier to entry, enabling teams to achieve immediate ROI in configuration management and multi-vendor consistency. It teaches the principles of Infrastructure as Code by focusing on the desired outcome rather than a step-by-step process.
-
Network Automation with Python Fast Track
This course provides a practical and hands-on approach to network automation using Python. It’s designed to empower network engineers to move beyond manual, time-consuming command-line interfaces. Participants will learn to leverage a full-featured programming language for advanced data manipulation, multi-vendor automation, and seamless integration with the broader IT ecosystem. The hands-on labs focus on automating real-world network devices from major vendors like Cisco, Arista, and others.
-
NISTv2.0: Integrating NIST Frameworks (ERM/CSF/RMF)
This three-day Integrating NIST Frameworks (ERM/CSF/RMF) course helps students to understand the background and integration of several key frameworks from the National Institute of Standards and Technology (NIST). The course explains the background and application of NIST’s Cybersecurity Framework (CSF) version 2.0, Enterprise Risk Approach, and Risk Management Framework (RMF), and their relationship to other NIST models such as those for Cybersecurity Workforce, Privacy Risk Management, and Cybersecurity Supply Chain Risk Management (C-SCRM). Discussion also addresses NIST Special Publication 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations, which many private organizations must apply within their own operations. Using CSF’s proven components (updated in 2024) as a way to organize risk expectations, outcomes and communication, the course explains the interaction among mission objectives and priorities, risk management through the language of business, and application of those objectives for managing risk for business systems and services. The course is developed and delivered by one of the primary CSF authors and includes materials help students to apply the CSF principles to treat cybersecurity risk management as an enterprise practice. The course helps security teams understand how to manage risk in line with executives’ priorities, and it helps leaders apply the necessary privacy & security enablers to prepare for an ever-evolving cybersecurity risk landscape. Note that although this course has been developed and will be delivered by an engineer who participated in numerous NIST projects, NIST itself does not
-
NSXICM4- VMware NSX: Install, Configure, Manage
This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX® environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more.
-
PL 200- Microsoft Power Platform Functional Consultant
This course will teach you to use Microsoft Power Platform solutions to simplify, automate, and empower business processes for organizations in the role of a Functional Consultant.
-
PL 300- Design and Manage Analytics Solutions Using Power BI
This course covers the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will show how to access and process data from a range of data sources including both relational and non-relational sources. Finally, this course will also discuss how to manage and deploy reports and dashboards for sharing and content distribution.
-
PL 400- Microsoft Power Platform Developer
In this course, students will learn how to build Power Apps, Automate Flows and extend the platform to complete business requirements and solve complex business problems.
-
PL 500- Microsoft Power Automate RPA Developer
Candidates for this course automate time-consuming and repetitive tasks by using Microsoft Power Automate. They review solution requirements, create process documentation, and design, develop, troubleshoot, and evaluate solutions.
-
PL 7001 Create and Manage Canvas Apps with Power Apps
Learners demonstrate the ability to solve business problems by creating canvas apps with Microsoft Power Platform. You will create a canvas app from scratch, connect a canvas app to a data source, configure a gallery and details screen, configure an input screen, and save and publish a canvas app.
-
PL 7002 Create And Manage Automated Processes By Using Power Automate
Get started with Power Automate by creating and managing automated processes with Power Automate. Including creating triggers for cloud flows, configuring actions, implementing conditional logic for a cloud flow, testing a cloud flow, creating and configuring approvals using Power Automate, and sharing cloud flows.
-
PL 7003 Create and Manage Model-Driven Apps with Power Apps and Dataverse
This course delivers an instructor-led product showcase for Microsoft Power Automate from start to finish in an engaging and practical way. Power Automate is a diverse product, turning business processes into automated, consistent and visual workflows. Power Automate is designed to interweave the various products in Microsoft 365 as well as connect to other on-premises and web-based solutions. This course will give you the confidence to select the right actions and workflow logic for your business workflows.
-
PL 900: Introduction to Microsoft Power Platform
Learn the business value and product capabilities of Microsoft Power Platform. Create simple Power Apps, connect data with Microsoft Dataverse, build a Power BI Dashboard, and automate processes with Power Automate.
-
PMP Certification Preparation
TechnicalLooking to advance your career in one of the most in-demand fields worldwide? Project management is rapidly growing—with an estimated 2 million project-related job openings expected each year through 2027. And as the demand rises, so do expectations: employers increasingly prioritize certified professionals, with over 70% of companies preferring candidates who hold the PMP® certification. The Project Management Professional (PMP)® certification is the global gold standard for project leaders. Governed by the Project Management Institute (PMI), PMP certification proves your ability to lead teams, manage budgets and timelines, and deliver results using predictive, agile, and hybrid methodologies. It also validates key interpersonal skills like conflict resolution, communication, and stakeholder engagement.
-
Preparing IT Leadership for AI
Applications TechnicalIn this Preparing IT Leadership for AI course, participants will focus on developing the strategic leadership skills required to lead AI-based projects and initiatives and address both the opportunities and risks that come with emerging technologies. The course will cover essential AI implementation leadership skills, equip leaders to assess their readiness, and help them identify when and when not to move forward with AI initiatives. By class end, attendees will be better prepared to navigate AI-driven changes and foster resilient, forward-thinking IT leadership.
-
PY 100 – Introduction to Python
TechnicalThis 5-day course balances lecture and lab exercises to ensure students can apply key Python programming knowledge and skills required to address network automation challenges in a multi-vendor infrastructure.
-
React Essentials
TechnicalThis intensive three-day course offers an in-depth exploration of modern React development. Moving beyond basic “Hello World” examples, this curriculum emphasizes the architectural patterns needed to create scalable, interactive Single Page Applications (SPAs). Through a combination of lectures and practical hands-on labs, participants will master the React ecosystem: from the Virtual DOM and JSX to managing complex state with Hooks and the Context API. The course avoids outdated class-based patterns in favor of modern functional components and custom hooks. The experience concludes with a comprehensive Capstone Project, where students will design and deploy a fully functional Weather Dashboard, reinforcing their ability to deliver production-ready code.
-
SC 100- Microsoft Cybersecurity Architect
This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
-
SC 200- Defend Against Cyberthreats with Microsoft's Security Operations Platform
Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender XDR and Microsoft Defender for Cloud. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.
-
SC 300- Microsoft Identity and Access Administrator
The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications.
-
SC 401- Protect Sensitive Information with Microsoft Purview in the AI Era
The Information Security Administrator course equips you with the skills needed to plan and implement information security for sensitive data using Microsoft Purview and related services. The course covers essential topics such as information protection, data loss prevention (DLP), retention, and insider risk management. You learn how to protect data within Microsoft 365 collaboration environments from internal and external threats. Additionally, you learn how to manage security alerts and respond to incidents by investigating activities, responding to DLP alerts, and managing insider risk cases. You also learn how to protect data used by AI services within Microsoft environments and implement controls to safeguard content in these environments.
-
SC 900- Introduction to Microsoft Security, Compliance, and Identity
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
-
SCOR - Implementing and Operating Cisco Security Core Technologies
The Implementing and Operating Cisco Security Core Technologies (SCOR) is a 5-day course which helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower® Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch® Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, prepares you for the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the CCNP Security, CCIE Security, and the Cisco Certified Specialist – Security Core certifications. The course qualifies for 64 Cisco Continuing Education Credits (CE) towards recertification.
-
SDWOTS- Cisco SD-WAN Operations Troubleshooting and Best Practices
This five-day course covers the new deployment, options and features of version 20.16 Cisco Software-Defined WAN (SD-WAN). SD-WAN is an overlay architecture that overcomes the biggest drawbacks of traditional WAN. Students will learn how to design, configure and operate a Cisco SD-WAN utilizing any transport (MPLS, Broadband, LTE, VSAT etc.). Candidates will discuss and build an SD-WAN environment starting from Day 0 provisioning and will also be able to provide troubleshooting, management, policy control and application visibility across the enterprise network. This hands-on Course covers the Cisco SD-WAN product and contains extensive labs to reinforce the knowledge learned. The course qualifies for 40 Cisco Continuing Education Credits (CE).
-
SFWIPA - Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention
The Securing Data Center Networks and VPNs with Cisco Secure Firewall Threat Defense (SFWIPA) training shows you how to deploy and configure the Cisco Secure Firewall Threat Defense system as a data center network firewall or Internet Edge firewall with VPN support. You'll learn how to configure identity-based policies, SSL decryption, remote-access VPN, and site-to-site VPN. The course also covers advanced Intrusion Prevention System (IPS) configuration, event management, integrations with other systems, troubleshooting, and automation using Application Programming Interfaces (APIs). Configuration migration from Cisco ASA is also included. This training prepares you for the 300-710 Securing Networks with Cisco Firepower (SNCF) exam and earns 40 Continuing Education (CE) credits.
-
SFWIPF - Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention
The Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) training shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next-generation firewall at the internet edge. You’ll gain an understanding of Cisco Secure Firewall architecture and deployment, base configuration, packet processing, and advanced options, and conducting Secure Firewall administration troubleshooting.
-
SharePoint Modern Experience: Site User
TechnicalIn many professional environments, people work collaboratively in teams. Information technology and applications facilitate this by enabling people to easily share, access, edit, and save information. Microsoft® SharePoint® is a platform specifically designed to facilitate communication and collaboration, enabling people to use familiar applications and web-based tools to create, access, store, and track documents and data in a central location. In this course, you will use SharePoint to access, store, share, and collaborate with information and documents.
-
SharePoint Modern Experience: Power User
TechnicalMicrosoft® SharePoint®, in conjunction with the Microsoft 365 suite of productivity and office automation tools, provides tools to create and manage a corporate intranet, facilitate content sharing and collaboration, and enable users to create, access, store, and track documents and data in a central location. This course is designed for users ready to advance their skills in SharePoint, covering topics such as planning and implementing a multi-site intranet, customizing site layouts, managing metadata, and improving site security and compliance. Participants will also learn how to integrate SharePoint with Power Apps to enhance data entry and presentation.
-
SISE - Implementing and Configuring Cisco Identity Services Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
-
SQL Querying (Fundamentals + Advanced)
TechnicalOrganizations store critical operational data within databases, and the ability to retrieve, analyze, and manage that data is essential to business success. Structured Query Language (SQL) is the primary tool used to interact with databases and extract meaningful insights. In this two-day course, participants will build a strong foundation in SQL querying and expand into advanced techniques used for real-world data analysis and database management. Beginning with core query skills, learners will progress to more complex concepts such as nested queries, data manipulation, views, indexing, and transaction management. By the end of this course, participants will be equipped to write efficient queries, manage and transform data, and support data-driven decision-making within their organization.
-
Terraform Essentials
TechnicalAs enterprises seek to deploy and maintain increasingly complex cloud infrastructure, there is a necessity to use “Infrastructure as Code” (IaC) tools, like Terraform. An open-source, state management tool developed by HashiCorp, Terraform allows developers to use a common coding interface to work through their various clouds safely and efficiently. Attendees will leave being able to write and understand Terraform code (HCL), have a clear understanding of Terraform’s various components and supporting tools, as well as when to reach for Terraform over another IaC tool, such as Ansible.
-
VCFBMS9- VMware Cloud Foundation: Build, Manage, and Secure
This five-day course provides you with the knowledge, skills, and abilities to achieve competence in deploying, managing, operating and securing private cloud using VMware Cloud Foundation® (VCF). You will learn about the architecture of VCF, storage and network management, licensing, and certificates. In addition to workload domains, availability, and life cycle management, the course also covers upgrade scenarios.
-
VCFDCM- VMware Cloud Foundation: Deploy, Configure, Manage
This five-day training course provides you with the knowledge, skills, and abilities to achieve competence with VMware Cloud Foundation 5.2. This course teaches you how deploy VMware Cloud Foundation, and perform the tasks required for the initial configuration and ongoing operation after deployment.
-
VKFCO- VMware Kubernetes Fundamentals and Cluster Operations
This four-day course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes.
-
VSICM80 - VMware vSphere: Install, Configure, Manage v8.0
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most VMware technologies in the software-defined data center. Attendance of this course meets the training requirement to achieve the following certification: VMware Certified Professional – Data Center Virtualization (VCP-DCV)
-
VSAA- VMware vSphere: Advanced Administration
This five-day course provides hands-on training to equip students with a range of skills, from performing routine VMware vSphere8 administrative tasks to complex vSphere operations and configurations. Through lab-based activities, students are immersed in real-life situations faced by VMBeans, a fictitious company. These situations expose students to real-life scenarios faced by companies that are building and scaling their virtual infrastructure. This course uses scenario-based lab exercises and does not provide guided step-by-step instructions. To complete the scenario-based lab exercises, you are required to analyze the task, research, and deduce the required solution. References and suggested documentation are provided. This course utilizes labs to teach students how to effectively navigate and manage vSphere. The course aligns fully with the VMware Certified Advanced Professional – Data Center Virtualization Deploy exam objectives.
-
VSFBMO- VMware vSphere: Foundation: Build, Manage, and Operate
This five-day course provides you with the knowledge, skills, and abilities to achieve competence in deploying, configuring and managing VMware vSphere Foundation. You will learn about the architecture of vSphere Foundation, compute, storage, networks, and licensing. This course prepares you to administer a vSphereFoundation, which includes VCF Operations 90, vCenter90, and ESX 90.
-
vSphere Configuration and Management v6.7
This class features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 6.7. This course prepares you to administer a vSphere infrastructure for an organization of any size and forms the foundation for most other VMware technologies in the software-defined data center.
-
Working with Elasticsearch 7.0
TechnicalThe Elastic Stack is a powerful combination of tools for techniques such as distributed search, analytics, logging, and visualization of data. Elastic Stack 7.0 encompasses new features and capabilities that will enable you to find unique insights into analytics using these techniques. Geared for experienced data analysts, IT professionals, and software developers who seek to augment their data processing and analytics capabilities, Working with Elasticsearch will explore how to use Elastic Stack and Elasticsearch efficiently to build powerful real-time data processing applications.
