Alternatives for Networking for End Users

Unfortunately it is not possible to request a brochure for this training. Here you will find some alternatives for "Networking for End Users" by Elearn UK. We hope we helped you to continue your search for training information.

check_box_outline_blank

ISO in the Sun: PECB EU General Data Protection Regulation (GDPR) Data Protection Officer

Logo ISO in the Sun
|META_INFO|

This five day course provides an overview to the requirements of the GDPR in force and applicable since 25th May 2018, and how to implement…

check_box_outline_blank

Microsoft Azure Data Fundamentals | DP-900 | DP900

Logo DutchTrain
|META_INFO|

Microsoft Azure Data Fundamentals | DP-900 IT-professionals will learn about core data concepts such as relational, non-relational, big dat…

check_box_outline_blank

M40364 Database Fundamentals incl. Practice Labs | 98-364 | MTA (e-learning)

Logo DutchTrain
|META_INFO|

M40364 Database Fundamentals incl. Practice Labs | 98-364 This training helps you prepare for Microsoft Technology Associate Exam 98-364 an…

check_box_outline_blank

Certified Hadoop Administrator

Logo Cybiant
|META_INFO|

The Certified Hadoop Professional Training discusses the fundamental concepts of Hadoop. Apache Hadoop is the open source software system f…

check_box_outline_blank

Certified Hadoop Professional

Logo Cybiant
|META_INFO|

The Certified Hadoop Professional Training discusses the fundamental concepts of Hadoop. Apache Hadoop is the open source software system f…

check_box_outline_blank

Introduction to Microsoft Azure Data [M-DP900]

Logo Global Knowledge Network Training Ltd.
|META_INFO|

OVERVIEW In this course, students will gain foundational knowledge of core data concepts and related Microsoft Azure data services. Student…

check_box_outline_blank

Enterprise and Solution Architecture Intermediate

Logo AssistKD
|META_INFO|

AssistKD's Enterprise and Solution Architecture Intermediate course provides delegates with a thorough understanding of enterprise, solutio…

check_box_outline_blank

z/OS TCP/IP Security Overview

Logo Perpetual Solutions
|META_INFO|

Prerequisites:General knowledge of TCP/IP on z/OS or OS/390Course Description:This course provides an overview of the security features ava…

check_box_outline_blank

Oracle Database 11g: Introduction to SQL

Logo Perpetual Solutions
|META_INFO|

Prerequisites:Familiarity with data processing concepts and techniques Data processingCourse Description:In this course students learn the …

check_box_outline_blank

ONTAP Data Protection Administration [ARR_NEP_OT-DPA]

Logo Global Knowledge Network Training Ltd.
|META_INFO|

OVERVIEW Explore key concepts and techniques for protecting data on NetApp® ONTAP® based storage systems. Learn about the data protection s…

check_box_outline_blank

BCS Foundation in Architecture Concepts and Domains [ASS_SFAC]

Logo Global Knowledge Network Training Ltd.
|META_INFO|

OVERVIEW An introduction to the essential approaches and concepts involved in enterprise, business, data, applications, software and infras…

check_box_outline_blank

MetroCluster Administration [ARR_NEP_OT-MC-ADM]

Logo Global Knowledge Network Training Ltd.
|META_INFO|

OVERVIEW In this course, you learn the knowledge and skills necessary to administer an ONTAP MetroCluster system. You will review the speci…

check_box_outline_blank

ACUCM: Administering Cisco Unified Communications Manager v7.0

Logo Perpetual Solutions
|META_INFO|

Prerequisites:No prerequisites are necessary. However, learners are expected to have a working knowledge of computer software, Windows navi…

check_box_outline_blank

Understanding SNMP, Including SNMPv3

Logo Excentis
|META_INFO|

field-type-text-long field-label-above"> Overview To manage communication systems and networks, a rich set of tools and applications are av…

check_box_outline_blank

Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPA]

Logo Global Knowledge Network Training Ltd.
|META_INFO|

OVERVIEW The Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention course shows you how to deploy and configure a …