Project Management Foundations

This course provides the foundation to the Best Practices in Project Management course and is taught by experienced project managers. This course is designed to provide foundational understanding of project management skills to those managing and/or helping on projects in any industry. Participants...Read More >

Microsoft 365 Security Administration

In this course, participants learn how to secure user access to their organization’s resources. The course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces conditional access in Microsoft...Read More >

Microsoft Security Operations Analyst

Participants learn how to investigate, respond to, and hunt for threats using Microsoft Azure Sentinel, Azure Defender, and Microsoft 365 Defender. In this course, participants will learn how to mitigate cyberthreats using these technologies. Specifically, participants will configure and use Azure...Read More >

Microsoft Azure Security Technologies

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data...Read More >

Administering and Positioning CISCO Umbrella Operations

Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet. Being able to understand and position how Cisco Umbrella works and what the features are is the key focus of this course. Participants will be able to describe the Cisco Umbrella,...Read More >

Implementing and Operating CISCO Security Core Technologies

In this course, participants will master the skills and technologies needed to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. Participants will learn security for networks, cloud and content, endpoint protection, secure network access,...Read More >