-
All
-
Online
-
Filters
Security Training
- Training
- Online
- Intermediate
- Different dates available
... and client Pass by value and reference SoapHeader Attribute Asynchronous Call to the WebMethod WebService Security WCF Evolution of WCF Evolution of Service... Learn about: Communication Training...
- Training
- Online
- Intermediate
- Different dates available
- 40h
... Business Atlas Deconstruction of World Business Atlas Deploying mashups Security implications License issues... Learn about: Data connections, Storage model, Entity Framework...
- Training
- London
... applications. Take advantage of the advanced functionality, reliable performance and dependable security. We have helped many clients to use Lotus Notes...
- Training
- Inhouse
... applications. Take advantage of the advanced functionality, reliable performance and dependable security. We have helped many clients to use Lotus Notes...
- Training
- London
- 5 Days
...Expert Level Network Design and Architecture Experience CCDE Assesses advanced Network Infrastructure Design Principles and Fundamentals for large networks. A CCDE can demonstrate an ability to develop solutions which address planning, design, integration, optimization, operations, security...
- Training
- Online
- Intermediate
- Different dates available
- 30h
... Cookbook Deploying Nodes In Production UnAttended Node Bootstrapping Chef-Client Cookbook (Security And Automated Runs) Using OpenSource Chef Server...
- Training
- Chennai (India)
- Intermediate
- Different dates available
... Cookbook Deploying Nodes In Production UnAttended Node Bootstrapping Chef-Client Cookbook (Security And Automated Runs) Using OpenSource Chef Server...
- Training
- Leeds
- 10 Months
... technicians. Course Outline: Personal Computer Components Laptops and Portable Devices Operating Systems Printers and Scanners Networks Security Safety...
- Training
- Tattenhall
... The current security environment must be considered Our objective is to deliver a programme which can be taught in one day. The delegate will acquire skills...
- Training
- Online
... important to service providers such as service provisioning, MPLS, VPNs, service level agreements and basic security...
- Training
- Online
- Intermediate
- Different dates available
... can work collaboratively with specialists on advanced security, voice, wireless and video solutions. The routing and switching protocol knowledge gained by attending this training program will help you enhance skills relevant in the physical networks and the virtualized network functions... Learn about: EIGRP Implementation, OSPF Implementation, Network Training...
- Training
- Chennai (India)
- Intermediate
- Different dates available
... Try creating reports Security aspect GCP IAM Learn Identity and access Management Learn about service accounts, Policy, Roles and members Basic IAM...
- Training
- Congleton
- 5 Days
... :- Service Catalogue Management. Information Security Management (ISM). Supplier Management. Service Transition Managing service transition and release policy...
- Training
- 1 Year
... and Professionalism Customer Care in ICT Technical Fault Diagnosis Remote Support for Products and Services Security of ICT Systems Technical Advice and Guidance...
- Training
- Online
- Intermediate
- Different dates available
- 30h
... and Security How secure is IoT Vulnerabilities in IoT Key aspects for securing IoT solutions Industrial Automation Service oriented Architecture Socrades... Learn about: Cloud Benefits, Tech stack...
- Training
- Exeter
- Beginner
- 1 Day
... regard for safety rules and proper vehicle use - Security of the vehicle and contents Ability to prevent criminality and trafficking in illegal immigrants...
- Training
- Chennai (India)
- Intermediate
- Different dates available
... and Security How secure is IoT Vulnerabilities in IoT Key aspects for securing IoT solutions Industrial Automation Service oriented Architecture Socrades... Learn about: Tech stack...
- Training
- Online
- Intermediate
- 30h
... Environment Management 3.3.2 Dimension Management 3.3.3 Designing Models 3.3.4 Designing Security Model 3.4 Consulting Issues 4 Loading, Scheduling and Managing... Learn about: Develping Rolling Forecast reprot, Performance Management, SAP EPM Add-In interface for Excel...
- Training
- Inhouse in London
- 3 Days
... testing Large Scale Integration testing Alpha and Beta testing Load, performance and stress testing Security testing Usability testing Storage and volume...
- Training
- Braintree
... in the following aspects: Knowledge of the dangers of the UN classes 2, 3,4, 5, 6, 8 & 9, Responsibilities under the Health and Safety at Work Act Security...