IT & Software
Showing 4669–4680 of 16328 results
Designing, Implementing, and Maintaining a Business Continuity Plan
The ability to recover from an incident is crucial to a company's survival. A business continuity plan can help a company quickly recover and survive these critical incidents while maintaining the trust of customers, investors, and vendors.
Designing/Deploying Exchange 2016: Client Access
This course is designed to help you prepare for the Microsoft 70-345 exam, and covers the objectives related to planning, deploying, managing and troubleshooting client access on Exchange 2016.
Designing/Deploying Exchange 2016: Compliance & Archiving
This course will teach you about Exchange 2016 compliance and archiving. Along with other courses in the series, this course will help to prepare you for the Microsoft 70-345 exam.
Designing/Deploying Exchange 2016: Hybrid & Migrations
This course is designed to help you prepare for your Exchange Server 2016 certificate exam, and focuses on the exam objectives for the "Implement and manage coexistence, hybrid scenarios, migration, and federation" portion of the exam.
Designing/Deploying Exchange 2016: Mailbox Databases
This course is designed to help you prepare for your Exchange Server 2016 certification exam and focuses on the exam objectives for the plan, deploy, manage, and troubleshoot mailbox databases portion of the exam.
Designing/Deploying Exchange 2016: Recipients & Security
This course will teach you about managing Exchange 2016 Active Directory, recipients, and security. Along with other courses in the series, this course will help to prepare you for the Microsoft 70-345 exam.
Designing/Deploying Exchange 2016: Transport
This course will teach you about Exchange 2016 transport design and deployment. Along with other courses in the series, this course will help to prepare you for the Microsoft 70-345 exam.
Detect objects in images
Object detection is used to locate and identify objects in images. You can use Azure AI Custom Vision to train a model to detect specific classes of object in images.
Detect, analyze, and recognize faces
The ability for applications to detect human faces, analyze facial features and emotions, and identify individuals is a key artificial intelligence capability.
Detecting Anomalies and Events with Packetbeat
In this course, you will learn the setup, configuration, and validation of Packetbeats in an enterprise environment. We will also cover some practical network and security use cases, as well as create custom alerts.
Detecting Anomalies and Events with Winlogbeat
Winlogbeat is an open-source log collector that ships Windows Event Logs to Elasticsearch or Logstash. In this course, you will learn the setup, configuration, and validation of Winlogbeat in an enterprise environment.
Dev-first Security: Learning from the Pioneers
This talk shares practices and learnings from companies with forward thinking security teams. You'll also hear practical tips and tricks from these leaders and a broader view on dev-first security.