-
Red Hat® OpenStack® Administration II (CL210)
Course Overview The focus of this course is managing Red Hat OpenStack Platform using the unified command-line interface, managing instances,…
-
Red Hat OpenStack Administration I (CL110)
Course Overview This course will teach students to install a proof-of-concept and configure, use, and maintain Red Hat OpenStack Platform….
-
Red Hat Rapid Track
Course Overview On completion of course materials, students should be prepared to take the Red Hat Certified System Administrator (RHCSA)…
-
Red Hat System Administration III
Course Overview The course is focused on deploying and managing network servers running caching Domain Name Service (DNS), MariaDB, Apache…
-
Red Hat System Administration II
Course Overview This course goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and…
-
Red Hat System Administration I
Course Overview Red Hat System Administration I provides a foundation for students wishing to become full-time Linux system administrators by…
-
VMware NSX: Install, Configure, Manage [V6.4]
Course Overview This five-day, comprehensive, fast-paced training course presents VMware NSX® as a part of the software-defined data center. You…
-
VMware vSphere: Install, Configure, Manage [V6.7]
Course Overview This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere® 7, which…
-
PRINCE2® Practitioner
Course Overview The PRINCE2 practitioner training course is particularly suitable for anyone requiring the qualification in order to implement best…
-
Advanced Ethical Hacking
Course Overview This advance ethical hacking course that is meant to be of practical experience to student, it is to…
-
Cyber Security for Beginners
Course Overview This is a course guide for all cyber security beginners with the objective of giving level entry skill…
-
Ethical Hacking
Course Overview This is an advance cyber security course with key issues plaguing the information security, information security controls, penetration…