Course Library
-
QuickBooks
ApplicationsThis course is designed to teach users the ins-and-outs of QuickBooks and its features.
-
Revit Architecture Fundamentals
TechnicalThe Autodesk® Revit software is a powerful Building Information Modeling (BIM) program that works the way architects think. The program streamlines the design process through the use of a central 3D model, where changes made in one view update across all views and on the printable sheets.
-
Revit Structure Fundamentals
TechnicalTo take full advantage of Building Information Modeling, the Autodesk® Revit® Structure Fundamentals training guide has been designed to teach the concepts and principles from building design through construction documentation using the Autodesk Revit Structure software.
-
RH 124 Red Hat System Administration Part 1
Red Hat System Administration I provides a foundation for students wishing to become full-time Linux system administrators by introducing key command line concepts and other enterprise-level tools. These concepts are further developed in the follow-on course, Red Hat System Administration II (RH134).
-
RH 134 Red Hat System Administration II
TechnicalRed Hat System Administration II (RH134) is designed as the second part of the Red Hat® Certified System Administrator (RHCSA®) training track for IT professionals who have taken Red Hat System Administration I (RH124). The course goes deeper into core Linux® system administration skills, including storage configuration, security feature management, task control, and installation and deployment of Red Hat® Enterprise Linux. This course is based on Red Hat Enterprise Linux 8.
-
RH 199 Red Hat RHCSA Rapid Track Course
Technical• Package management with new repository structure and appstream modules • Create storage devices, volumes, and file systems, including Stratis storage management • Configure network services and security • Manage processes, scheduling, and tuning • Manage users, groups, and authentication • Perform server management with the Cockpit web management utility • Troubleshoot and obtain support • Run containers
-
RH 318 Red Hat Enterprise Virtualization
TechnicalThrough numerous hands-on exercises, you will deploy and configure Red Hat Virtualization and use it to provision and manage virtual machines. This course also prepares you for the Red Hat Certified Specialist in Virtualization certification exam.
-
RH 342 Red Hat Enterprise Linux Diagnostics and Troubleshooting
Students will learn how to apply the scientific method to a structured form of troubleshooting. This approach is then used troubleshooting various types of problems, including boot issues, hardware issues, storage issues, RPM issues, network issues, third-party application issues, security issues, and kernel issues. At the end of the course students can complete various comprehensive review labs to test their skills.
-
RH 354 Red Hat Enterprise Linux 8 New Features for Experience Administrators
Red Hat Enterprise Linux 8 New Features for Experienced Linux Administrators (RH354) introduces you to updates in the upcoming Red Hat® Enterprise Linux® release. Intended for experienced Linux system administrators, this course offers a rapid orientation to Red Hat Enterprise Linux 8 based on the pre-release beta. The offering prepares operators, managers, principal system administrators, and other IT professionals with experience in Red Hat Enterprise Linux 7 for deployments and migrations to the new release. This course is based on Red Hat Enterprise Linux 8. Course content summary: • Install Red Hat Enterprise Linux 8 using the new packaging, modularity, and appstream features. • Upgrade from Red Hat Enterprise Linux 7 to Red Hat Enterprise Linux 8 using new tools. • Perform integrated file system and volume management using Stratis. • Use Cockpit for system management. • Create system images with Composer. • Configure Identity Management using authselect. • Understand the Wayland graphical display server. • Deploy containers using the new integrated OCI runtime and tools. • Configure firewall rules that use the new NFT back end.
-
RH 362 Red Hat Security: Identity Management and Active Directory Integration
This course teaches you skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance.
-
RH 403 Red hat Satellite 6 Administration
Students will use Red Hat Satellite to manage the software development life cycle of a subscribed host and its configuration, and learn how to provision hosts integrated with software and Puppet configuration management upon deployment.
-
RH 436 Red Hat High Availability Clustering
Created for senior Linux® system administrators, this 4-day course strongly emphasizes lab-based activities. You'll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment. This course also helps you prepare for the Red Hat Certified Specialist in High Availability Clustering exam (EX436).
-
RH 442 Red Hat Enterprise Performance Tuning
This course discusses system architecture with emphasis on: Understanding the implications on system performance, Methods for testing the effects of performance adjustments, Open source benchmarking utilities, Methods for analyzing system and networking performance, tuning configurations for specific application loads. This course can also help you prepare for the Red Hat Certified Specialist in Linux Performance Tuning exam (EX442).
-
R PHY - Remote PHY Deep Dive
TechnicalRemote PHY (R-PHY) is a key component in the cable industry’s adoption of a Distributed Access Architecture (DAA). This Deep Dive course examines Cisco’s deployment of R-PHY architecture and devices. Remote PHY (R-PHY) is a key component in the cable industry’s adoption of a Distributed Access Architecture (DAA). DAA and R-PHY are foundational technologies for future innovative network architectures such as Virtual CMTS (vCMTS), Cloud Native Broadband Router (cnBR), and Full-duplex DOCSIS. R-PHY enables the migration of physical layer (PHY) functions (such as RF Spectrum generation) from the Headend to the network edge - leading to more robust RF networks. The deployment of DAA/R-PHY, coupled with DOCSIS 3.1, allows cable operators to deliver ultrabroadband services with maximum downstream/upstream speeds approaching 10 Gbps/1 Gbps respectively.
-
SAFER - Safe Actions for Employee Return
Professional DevelopmentThe core objective of SAFER is establishing sustainable safe operations for employers and workers as they navigate what the world of work looks like as a result of the COVID-19 pandemic.
-
Sales Professional Essentials
Professional DevelopmentProspecting is one of the keys to your sales success. A new generation of sales professionals are emerging: highly trained and well groomed, with the characteristics of honesty, trustworthiness, and competence.
-
SC-100T00: Microsoft Cybersecurity Architect
This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS).
-
SC 200T00 Microsoft Security Operations Analyst
Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender.
-
SC 300T00 Microsoft Identity and Access Administrator
The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications.
-
SC-400T00 Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400)
-
SC 900T00 Microsoft Security, Compliance, and Identity Fundamentals
This course provides foundational level knowledge on security, compliance, and identity concepts and related cloud-based Microsoft solutions.
-
SCOR - Implementing and Operating Cisco Security Core Technologies
The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco® CCNP® Security and CCIE® Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcement. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.
-
SDAINT - DNA Center and SD-Access Training
DNA Center and SD-Access offer Cisco’s next-generation programmable digital network to help automate common network access security features and streamline the redundant, complex configuration required to allow different groups of users access to the network infrastructure. This network security training course allows network administrators to quickly allow differentiated access for end users on the network while allowing the network to react automatically to day zero and other types of attacks. Students who enroll in this course should have a basic understanding of Cisco CCNA Routing & Switching, of Software Defined Networks, and have experience with Cisco IOS, IOS XE, and CLI.
-
SDWFND Cisco SD-WAN Operation and Deployment
The Cisco SD-WAN Operation and Deployment (SDWFND) v1.0 is a 2-day instructor-led hands-on course provides an overview of the Cisco SD-WAN solution and SD-WAN components. You will learn how to create, manage, and operate a secure extensible network using Cisco SD-WAN products. Cisco SD-WAN is a new technology, this training covers salient features such as zero-touch provisioning, secure network bring-up, configuration using feature templates, configuration of Overlay Management Protocol (OMP) and policies for network traffic management. Students will also learn about policies and quality of service (QoS) in the SD-WAN overlay network.
-
SDWOTS - SD-WAN Advanced Operations & Troubleshooting Bootcamp
SD-WAN: Advanced Operations & Troubleshooting Bootcamp (SDWOTS) v1.0 is a five-day course. We will cover Cisco Software-Defined WAN (SD-WAN) which is an overlay architecture that overcomes the biggest drawbacks of traditional WAN. Students will be able to operate a Cisco SD-WAN over any transport (MPLS, Broadband, LTE, VSAT etc.) and provide troubleshooting, management, policy control and application visibility across the enterprise. This hands-on Course covers the Cisco SD-WAN product and contains extensive labs to reinforce the knowledge learned.
-
Security Awareness
ApplicationsLearn to identify and apply security techniques to your computer, whether you are at home or in the office.
-
Security Awareness (4-Hour Course)
ApplicationsLearn to identify and apply security techniques to your computer, whether you are at home or in the office.
-
SESA 3.1 - Securing Email with Cisco Email Security Appliance
The Securing Email with Cisco Email Security Appliance (SESA) v3.1 course shows you how to deploy and use Cisco® Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA), which leads to CCNP® Security and the Certified Specialist - Email Content Security certifications.
-
Sexual Harassment - A Guide for Prevention
Professional DevelopmentHow do you prevent harassment from occurring? What sorts of policies should be in place? What should managers do to protect their employees? And if a complaint is filed, what will we do? A course for HR Pros, Managers, and Executive Leadership, all of these questions (and more!) will be answered in this one-day workshop.
-
Sexual Harassment Awareness and Prevention
Professional DevelopmentWhat is Sexual Harassment? A class for every employee, this half-day workshop provides an overview of sexual harassment and explains how to prevent it from happening in the workplace.
-
SFWIPF - Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention
The Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) training shows you how to implement and configure Cisco Secure Firewall Threat Defense for deployment as a next-generation firewall at the internet edge. You’ll gain an understanding of Cisco Secure Firewall architecture and deployment, base configuration, packet processing, and advanced options, and conducting Secure Firewall administration troubleshooting.
-
SharePoint Power User
TechnicalMicrosoft® SharePoint®, in conjunction with the Microsoft 365™ productivity and office automation suite, provides tools to create and manage a corporate intranet, facilitate content sharing and collaboration, and enable users to create, access, store, and track documents and data in a central location. Users who already have experience as SharePoint site members and owners may be ready to move on to more advanced site-building tasks such as using custom site templates, custom themes, applying advanced permissions settings, improving security, and preparing sites to support governance and compliance. Advanced site builders may be ready to undertake more advanced site management tasks, working in conjunction with their SharePoint Administrator to create and use custom site templates, term sets and metadata, manage information governance and compliance, and get deeper into SharePoint security configuration. This course focuses on these advanced site-building and administration tasks.
-
SharePoint Site User
TechnicalIn many professional environments, people work collaboratively in teams. Information technology and applications facilitate this by enabling people to easily share, access, edit, and save information. Microsoft® SharePoint® is a platform specifically designed to facilitate communication and collaboration, enabling people to use familiar applications and web-based tools to create, access, store, and track documents and data in a central location. In this course, you will use SharePoint to access, store, share, and collaborate with information and documents.
-
SISE - Implementing and Configuring Cisco Identity Services Engine
The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco® Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency.
-
SMART Goal Setting
Professional DevelopmentKnowing what we want to accomplish and how we intend to accomplish it is the first step to taking constructive action steps to meeting our work goals.
-
SQL Querying (Fundamentals + Advanced)
TechnicalIn today's competitive environment, information is one of the most important factors in determining the success of an organization. If you are able to manage and retrieve information efficiently, you can streamline the organization's processes and give it a competitive edge. As the organization grows, you will need to handle large amounts of data. Under such circumstances, you might need to query multiple tables simultaneously and with increasing frequency. You must step up the speed of generating query output to cope with the increasing demands of data storage, management, and retrieval.
-
SSNGFW - Securing Networks with Cisco Firepower Next Generation Firewall
The Securing Networks with Cisco Firepower Next-Generation Firewall (SSNGFW) v1.0 is a 5-day instructor-led course that introduces learners to the powerful features of Cisco Firepower Threat Defense, including VPN configuration, traffic control, NAT configuration, SSL decryption, advanced NGFW and NGIPS tuning and configuration, analysis, and troubleshooting.
-
Strategic Decision Making and Problem Solving
Professional DevelopmentWe make decisions and solve problems continually. We start making decisions before we even get out of bed (shall I get up now or not?). Sometimes, we will have made as many as 50 decisions by the time we leave for work. Despite all the natural decision making that goes on and the problem solving we do, some people are very uncomfortable with having to make decisions. You may know someone who has a hard time making decisions about what to eat, never mind the internal wrestling they go through in order to take on major decisions at work.
-
Strategic Decision Making and Problem Solving (1-Day Course)
Professional DevelopmentWe make decisions and solve problems continually. We start making decisions before we even get out of bed (shall I get up now or not?). Sometimes, we will have made as many as 50 decisions by the time we leave for work. Despite all the natural decision making that goes on and the problem solving we do, some people are very uncomfortable with having to make decisions. You may know someone who has a hard time making decisions about what to eat, never mind the internal wrestling they go through in order to take on major decisions at work.
-
Stress Management
Professional DevelopmentToday’s workforce is experiencing job burnout and stress in epidemic proportions. This one-day workshop explores the causes of such stress, and suggests general and specific stress management strategies that people can use every day.
-
SWSA - Securing the Web with Cisco Web Security Appliance
Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you"™ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution"™s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more.
-
Tableau Desktop: Part 1
ApplicationsAs technology progresses and becomes more interwoven with our businesses and lives, more and more data is collected about business and personal activities. This era of "big data" has exploded due to the rise of cloud computing, which provides an abundance of computational power and storage, allowing organizations of all sorts to capture and store data. Leveraging that data effectively can provide timely insights and competitive advantage.
-
Tableau Desktop: Part 2
ApplicationsThe advent of cloud computing and storage has ushered in the era of "big data." With the abundance of computational power and storage, organizations and employees with many different roles and responsibilities can benefit from analyzing data to find timely insights and gain competitive advantage.
-
Time Management
Professional DevelopmentMany people find that they flit from one task to another, trying to get everything done. In this one-day workshop, you will learn how to make the most of your time by getting a grip on your workflow and office space, using your planner effectively, and delegating some of your work to other people.
-
To Topology and Beyond: Introduction to 3D Modeling
Learn the basics of 3D modeling with this one week crash course. Design and model your very own 3D spacecraft using Autodesk Maya. In this course you will discover how to properly model, texture and render a film ready object you made yourself!
-
Train the Trainer
Professional DevelopmentThis three-day course will give you the skills that you need so that your students not only learn, but also enjoy the process, retain information shared and use their new skills back in the workplace. Participants will also have the opportunity to identify their personal learning objectives.
-
UCCXD - Deploying Cisco Unified Contact Center Express v6.0
This course, Deploying Cisco Unified Contact Center Express (UCCXD) provides the student with hands-on experience and knowledge of tasks typically performed during contact center deployment. This includes the deployment of Cisco Unified Contact Center Express and Cisco Unified IP Interactive Voice Response (IVR) (Cisco Unified CCX and Cisco Unified IP IVR) as contact center solutions. Tasks include planning, installation, and configuration, scripting, and troubleshooting.
-
UCS-X Intersight Deployment
TechnicalThe Cisco UCS X-Series with Intersight Deployment course will enable Cisco customers, internal and Partner SEs/FEs to deploy the UCS X9508 chassis, X210c compute nodes, 6400 Series Fabric Interconnects, and options.
-
Unconscious Bias
Professional DevelopmentWe may make decisions based on unseen preferences – where we grew up or lessons learned in childhood, for example – that may lead us to favor a certain car over another, or a certain person over another – based not on qualifications, but on appearances, culture, or ‘something I just can’t put my finger on.’
- Using DiSC Assessments to Improve Performance (4 Hours)
-
Using Google Workspace
ApplicationsThe core productivity apps that make up the Google WorkspaceTM suite enable users to work together on a variety of projects and tasks across many different industries and job roles. This course will teach you how to work efficiently and effectively in apps like GmailTM, Google DriveTM, Google DocsTM, Google SheetsTM, Google MeetTM, Google ChatTM, and more—all while participating in a collaborative team environment.
-
Using Microsoft Windows 10
ApplicationsWelcome to Using Microsoft® Windows® 10 (Second Edition). Whether you're new to computers or have used them in the past, this class will help you become more comfortable using a personal computer (PC) and, more specifically, the Windows 10 interface.
-
Using Microsoft Windows 11
ApplicationsWhether you're new to computers or have used them in the past, this class will help you become more comfortable using Windows® 11 by familiarizing you with the Windows 11 user interface and its basic capabilities. In this course, you will explore Windows 11 and learn how to work with locally installed apps and cloud-based apps, browse the Internet, and manage basic Windows 11 settings.
-
Utilizing Personality Types for Self-Leadership
Professional DevelopmentParticipants will complete an MBTI personality trait inventory and learn principles of self-leadership, explore leadership styles, and how to lead from within regardless of hierarchy on the management ladder. At the end of this workshop, students will be able to understand why/how personality assessments are used in different situations, know specific traits of each of the 16 different personality types, and more!
-
Visio
ApplicationsThis two-part course provides an extensive exploration of Microsoft® Visio®, equipping participants with both foundational and advanced skills for creating a wide range of professional visual diagrams. In Part 1, learners are introduced to Visio’s basic tools, enabling them to design clear workflows, organization charts, floor plans, network diagrams, and other essential visuals. Through hands-on exercises, they’ll gain proficiency in crafting diagrams that enhance communication and streamline complex information. Building on these fundamentals, Part 2 delves into Visio’s advanced capabilities, including custom shape creation, linking diagrams to external data, and leveraging development tools. Participants will learn to create sophisticated diagrams, such as detailed floor plans, data-linked Gantt charts, and timelines. The course also covers best practices for sharing and embedding Visio drawings within other Microsoft Office applications, ensuring seamless integration across platforms. By the end of this course, participants will be prepared to use Visio effectively in a variety of professional settings, from process mapping to complex data visualization.
-
VMware Horizon 8: Deploy and Manage
VMware Horizon 8: Deploy and Manage is a five-day combination course of VMware Horizon 8: Skills for Virtual Desktop Management & VMware Horizon 8: Infrastructure Administration. This training collection gives you the hands-on skills to deliver virtual desktops and applications through a single virtual desktop infrastructure platform. You will build on your skills in configuring and managing VMware Horizon® 8 through a combination of lecture and hands-on labs. You learn how to configure and deploy pools of virtual machines and how to provide a customized desktop environment to end-users. Additionally, you will learn how to install and configure a virtual desktop infrastructure platform. You learn how to install and configure VMware Horizon® Connection Server™, VMware Unified Access Gateway™, how to configure a load balancer for use with Horizon, and how to establish Cloud Pod Architecture.
-
VMware vSphere: Install, Configure, Manage [V8]
This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to administer a vSphere infrastructure for an organization of any size.
-
vSphere Configuration and Management v6.7
This class features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 6.7. This course prepares you to administer a vSphere infrastructure for an organization of any size and forms the foundation for most other VMware technologies in the software-defined data center.
-
Web Design with HTML5 and CSS3
ApplicationsIn this course, students will create a basic web page, Structure content, Apply styles, Work with tables, Navigate a website, Create web page layouts, Manage CSS, test a website, Create advanced navigation, Incorporate metacontent and multimedia, Create basic forms.
-
WLFNDU - Understanding Cisco Wireless Foundations
The Understanding Cisco Wireless Foundations (WLFNDU) v1.0 course gives you the knowledge and skills you need to position, plan, implement, operate, and manage a Cisco® wireless LAN (WLAN) network. This course teaches you how to design, install, configure, monitor, and conduct basic troubleshooting tasks on a Cisco WLAN network of any size.
-
Word Level 1
ApplicationsOur Microsoft Word Level 1 provides the basic concepts and skills to start being productive with Microsoft Word: how to create, format, and set up a document, and how to add graphics and tables
-
Word Level 2
ApplicationsOur Microsoft Word Level 2 provides the concepts and skills to use some more advanced features of Microsoft Word, including enhanced formatting, character and paragraph styles, references, editing, sharing, and saving to various formats.
-
Word Level 3
ApplicationsOur Microsoft Word Level 3 covers advanced skills for Microsoft Word power users: advanced formatting features, document management, references, data fields and sources, macros, and forms.
-
Working with Elasticsearch 7.0
The Elastic Stack is a powerful combination of tools for techniques such as distributed search, analytics, logging, and visualization of data. Elastic Stack 7.0 encompasses new features and capabilities that will enable you to find unique insights into analytics using these techniques. Geared for experienced data analysts, IT professionals, and software developers who seek to augment their data processing and analytics capabilities, Working with Elasticsearch will explore how to use Elastic Stack and Elasticsearch efficiently to build powerful real-time data processing applications.
-
Workplace Bullying and Harassment Awareness and Prevention
Professional DevelopmentBullying, especially workplace bullying, can be hard to identify and address. When most people think of bullying, images immediately come to mind of children in a schoolyard being taunted, pointed at, called names, ostracized, and physically threatened. However, workplace bullying is something that looks very different and can be detrimental to teams and organizations. This workshop will help participants recognize workplace bullying and harassment and will give them proactive techniques so that it doesn’t become something their team or organization suffers.