Global Knowledge Network Training Ltd.: 573 products
EC-Council Certified Ethical Hacker (CEH) + Exam voucher [CEH]
OVERVIEW CEH v13 - Prepare for the CEH certification and learn to think like a hacker while looking for system weaknesses and vulnerabiliti…
ONTAP Cluster Administration [ARR_NEP_OT-CLU-A]
OVERVIEW In this course, you learn the basic administration tasks of a NetApp® ONTAP® 9.16 cluster. Use the clustershell and NetApp ONTAP S…
Storage System Recovery & Troubleshooting [ARR_NEP_SS-RT]
OVERVIEW In this course, you learn about the recovery of offline systems. You learn some of the reasons that systems go offline, including …
The Essentials of Webex Calling [CLWXCALL]
OVERVIEW The Essentials of Webex Calling (CLWXCALL) course is designed to guide you through a complete Webex Calling setup, from the initia…
EC-Council Certified Incident Handler (ECIH) + Exam voucher [ECIH]
OVERVIEW The latest revision of EC-Council’s Certified Incident Handler (E|CIH) certified program has been designed and developed in collab…
Project Controlling in SAP S/4HANA Project System [S4123]
OVERVIEW This course introduces you to the key management accounting business processes within the SAP S/4HANA Project Control (Project Sys…
AWAF Modern Application v17.1. [ARR_F5N_BIG-AWAF]
OVERVIEW In this 4-day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Ap…
Catalyst Center and Catalyst 9K Programmability Integration Fundamentals (CATCPF) [N1_CATCPF]
OVERVIEW CATCPF (Cisco Catalyst Center Programmability Integration Fundamentals) is a 3-day, instructor-led, Cisco Catalyst Center course t…
Introduction to Juniper Security (IJSEC) [ARR_JUN_IJSEC]
OVERVIEW This three-day course provides students with the foundational knowledge required to work with the Junos operating system and to co…
Juniper Security (JSEC) [ARR_JUN_JSEC]
OVERVIEW This four-day, intermediate-level course provides students with the knowledge required to work with Juniper Connected Security dev…
Managing Virtual Machines with Red Hat OpenShift Virtualization [DO316]
OVERVIEW Create and manage virtual machines on OpenShift using the Red Hat OpenShift Virtualization operator Managing Virtual Machines with…
Information Security Administrator (SC-401) [M-SC401]
OVERVIEW Implement information security of sensitive data by using Microsoft Purview and related services. The Information Security Adminis…
SAP BW/4HANA Query Design and Analysis [BW405]
OVERVIEW This course provides an overview of SAP BW/4HANA and detailed knowledge to design BW Queries in both SAP BW/4HANA and SAP BW power…
SAP Agile Project Delivery [ACT200]
OVERVIEW This workshop has specifically been set-up to enable more project managers and consultants to (a) embed Agile in the project appro…
Enterprise Kubernetes Storage with Red Hat OpenShift Data Foundation (DO370) [DO370]
OVERVIEW Learn the essential skills required to design, implement, and manage a Red Hat OpenShift Data Foundation cluster and perform day-t…