Showing 10177–10188 of 18767 results
Introduction to the Troubleshooting Microsoft Teams (MS-740) Exam
Microsoft Teams is one of the most popular collaboration tools in the world with over 145 million daily active users. This course will introduce you to the MS-740: Troubleshooting Microsoft Teams certification exam.
Introduction to the VCP-CMA Certification
This course provides an overview of the different certification paths VMware has to offer, introduces the VCP-CMA exam, and lines out some topics you should already be familiar with.
Introduction to the VCP-DCV Certification
Are you looking to get certified with VMware's Data Center Virtualization exam? This course provides an overview of VMware’s certification tracks, introduces the VCP-DCV exam, and offers guidance on the required skills to be successful with the exam.
Introduction to the VCP-DCV Certification (2V0.21.23)
Are you interested in becoming a VMware Certified Professional? This course provides an overview of VMware’s certification tracks, explores the VCP-DCV certification, and provides guidance on the required skills needed to successfully pass the exam.
Introduction to the VCP-NV Certification
Are you interested in VMware's Network Virtualization exam? This course provides a brief overview of VMware’s certification tracks, introduces the VCP-NV exam, and offers guidance on the required skills to be successful with the exam.
Introduction to the WiX Toolset
This course will provide you with a complete introduction to the WiX Toolset and Windows Installer.
Introduction to the z/OS Mainframe Environment
This course introduces the system z hardware and z/OS operating systems for new users.
Introduction to Threat Intelligence (C|TIA Prep)
Threat intelligence is a crucial part of any cyber-security program, and there is a global shortage of threat intelligence analysts that is continuing to grow. This course introduces you to the skills necessary to function in this critical role.
Introduction to threat modeling
Threat modeling is an effective way to help secure your systems, applications, networks, and services. It's an engineering technique that identifies potential threats and offers recommendations to help reduce risk and meet security objectives earlier in the development lifecycle.
Introduction to Toon Boom – Let’s create your first character
Learn to create 2D Characters for animation
Introduction to Tort Law
This Free Online Course Includes: 1.5-3 Hours of Learning CPD Accreditation Final Assessment
Introduction to Training of Trainers
This Free Online Course Includes: 4-5 Hours of Learning CPD Accreditation Final Assessment