Showing 1525–1536 of 4482 results

Estimating One-time and Recurring Costs for Microsoft Azure
Despite the clear advantages of public clouds, a great amount of customers are still running workloads on-premises, with cost being of the biggest fear factors. In this course, you'll learn how to confidently define the cost of your Azure resources.

Estimating the Work within Your Team – Get the Most Value by Doing the Work That Matters
This course will teach you how to effectively and efficiently manage your team by estimate the work that they are doing to identify what work tasks matters thereby getting the most value from the work that they are doing for the organization.

Ethernet Operation and Switch Configuration
Since Ethernet is a widely used protocol in data networking, you'll spend most of the course examining Ethernet. You'll also examine physical components required for networking, as well as the layer 2 protocols used in network communication.

Ethical AI
Explore ethical considerations and frameworks for developing responsible AI systems that align with societal values.

Ethical Hacking: Cloud Computing
Welcome to Ethical Hacking: Cloud Computing. This course will teach you cloud security concepts needed for the Certified Ethical Hacking Exam.

Ethical Hacking: Cryptography
Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.

Ethical Hacking: Enumeration
The third phase attackers perform on a target is enumerating accounts and services. This course will teach you skills attackers use for enumeration that needed for the Certified Ethical Hacking exam.

Ethical Hacking: Exam Review and Tips
Achieving a passing score on the CEH® exam requires knowledge, experience, and preparation. In this course, Ethical Hacking: Exam Review and Tips, you’ll learn the steps to prepare yourself for the CEH 312-50 Exam.

Ethical Hacking: Hacking IoT and OT
The past few years have seen the explosion in IoT and OT devices that connect us to the internet, and hackers took notice. This course will teach you the ethical hacking skills needed for the CEH 312-50 exam

Ethical Hacking: Hacking Mobile Platforms
Mobile devices are the next big attack vector for attackers. This course will teach you [how to secure these devices and the challenges they present to organizations needed for the CEH 312-50 Exam.

Ethical Hacking: Hacking Wireless Networks
Wireless provides one of the biggest attack vectors for hackers. This course will teach you how to secure wireless networks needed for the CEH 312-50 exam.

Ethical Hacking: Malware Threats
Malware is specifically designed to gain access or damage systems without the knowledge of the victim. This course will teach you how malware is created, utilized, and detected. You’ll learn all that is needed for the CEH 312-50 exam concerning malware.