All `Live Courses by Practice Area Courses
Test descriptionFilter by Topic
Filter by Vendor
PMI – PgMP (Program Management Professional)
Course Description The Program Management Professional (PgMP)® training course will …
Microsoft Office 365 Online (With Teams)
Course Description: This course is an introduction to Microsoft Office …
What you'll learn
Sign in, navigate, and identify components of the Office 365 environment
Create, edit, and share documents with team members using the Office Online apps, SharePoint, OneDrive for Business, and Delve
Collaborate and work with colleagues using the Yammer and Planner apps
Use email and manage contacts with Outlook on the web
Collaborate using Teams
Configure Teams
AZ-700: Designing and Implementing Microsoft Azure Networking Solutions
Course Description: This course covers the process of designing, implementing, …
What you'll learn
Azure Virtual Networks
Design and Implement Hybrid Networking
Design and implement Azure ExpressRoute
Load balancing non-HTTP(S) traffic in Azure
Load balancing HTTP(S) traffic in Azure
Design and implement network security
Design and implement private access to Azure Services
Situational Leadership
Course Description 1. Leadership Overview Manager vs. Leader What Type …
Time Management
Course Description Overwhelmed by all the demands on your time? …
Effective Communication Basics
Description In this Training, you learn how to achieve results …
Emotional Intelligence
Course Description Emotional intelligence, also referred to as Emotional Quotient …
CyberSec First Responder® (CFR)
Course Description This course covers network defense and incident response …
What you'll learn
Compare and contrast various threats and classify threat profile
Explain the purpose and use of attack tools and technique
Explain the purpose and use of post exploitation tools and tactic
Explain the purpose and use of social engineering tactic
Given a scenario, perform ongoing threat landscape research and use data to prepare for incident
Explain the purpose and characteristics of various data source Given a scenario, use appropriate tools to analyze log
Given a scenario, use regular expressions to parse log files and locate meaningful data
Given a scenario, use Windows tools to analyze incidents
Given a scenario, use Linux-based tools to analyze incidents
Summarize methods and tools used for malware analysis
Given a scenario, analyze common indicators of potential compromise
Explain the importance of best practices in preparation for incident response
Given a scenario, execute incident response process
Explain the importance of concepts that are unique to forensic analysis
Explain general mitigation methods and devices