Global Knowledge Network Training Ltd.: 427 products
Check Point Threat Prevention Specialist (CTPS) R81_20 [ARR_CKT_CTPS_R81_20]
OVERVIEW This two-day Specialist-level course is designed for security professionals who want to gain the concepts and skills necessary to …
Customizing in SAP S/4HANA Asset Management [S43300]
OVERVIEW The new training course S43300 replaces former course S4133. OBJECTIVES This course will prepare you to: make all relevant customi…
SAP HANA High Availability and Disaster Tolerance Administration [HA201]
OVERVIEW This course covers all key capabilities of SAP HANA database system in the areas of high availability and disaster tolerance. Thro…
Deep Learning Theory and Practice [HPE_HU0F0S]
OVERVIEW This training covers the foundations of artificial intelligence and machine learning, with special focus on deep learning. Best pr…
A4Q Business Acumen Course with Online Exam [ASS_BBAC]
OVERVIEW Great business instinct can be learned. Our Business Acumen course explores the knowledge, skills and understanding required to av…
DevOps Institute: DevSecOps Foundation - Including Exam [DEVSOF]
OVERVIEW Integrating security practices into DevOps, such as Security as Code, is a way for security practitioners to operate and contribut…
Palo Alto Networks: Panorama Centralized Network Security Administration [PAN-PCNS-ADMIN]
OVERVIEW The Palo Alto Networks Panorama: Centralized Network Security Administration course is two days of instructor-led training that sh…
Planning and Administering Microsoft Azure for SAP Workloads (AZ-120) [M-AZ120]
OVERVIEW This course teaches IT Professionals experienced in SAP solutions how to leverage Azure resources that include deployment and conf…
FCSS Enterprise Firewall [ENW_ENFCSSFW]
OVERVIEW In this course, you will learn how to implement and centrally manage an enterprise security infrastructure composed of multiple Fo…
Media Essentials for IT Business Decision Makers [GK1977]
OVERVIEW In this course, you will learn the media and cloud fundamentals that empower you to develop a cloud strategy that meets your busin…
Palo Alto Networks: Cortex XDR Security Operations and Integration [PAN-CXDRSOI]
OVERVIEW Gain hands-on expertise in security operations, incident investigation, and system optimization to effectively protect modern envi…
Effective Facilitation for Business Analysts [GK2657]
OVERVIEW Acquire the facilitation skills necessary to effectively manage requirements meetings and workshops. Business analysts have the re…
Red Hat OpenShift Development I: Introduction to Containers with Podman [DO188]
OVERVIEW A developer introduction to building and managing containers with Podman for deploying applications on Red Hat OpenShift. Red Hat …
ONTAP SAN Administration 9.8 [ARR_NEP_OT-SANA]
OVERVIEW Explore block-level protocols, including FC, FCoE, iSCSI, NVMe over FCoE (NVMe/FC), and NVMe over TCP (NVMe/TCP), on Microsoft Win…
Developing iRules for BIG-IP v.17.1 [ARR_F5N_BIG-IRULE-CFG]
OVERVIEW This 3-day course provides networking professionals a functional understanding of iRules development. The course builds on the fou…