Training

  1. Events

  2. Training

Views Navigation

Event Views Navigation

Today
Ongoing
$5000.00

CWS-215 | Citrix Virtual Apps and Desktops 7 Administration On-Premises and in Citrix Cloud

Online and Virtual through Layer 8

Built for experienced IT Professionals who want to be familiar with Citrix Virtual Apps and Desktops 7 in an on-premises environment and Citrix Cloud. Potential students include administrators or engineers responsible for the end user workspace and overall health and performance of the solution. If you are new to Citrix or if you are planning a move to Citrix Cloud, this course is a necessary step in enabling you with the right training and skills to manage and deploy Citrix...

$5000.00

CWS-322 | Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration

Online and Virtual through Layer 8

Designed for experienced IT professionals, this course builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations. You will learn to build to implement Workspace Environment Management to improve logon times, centralize user settings management, and optimize the performance of machines. In the advanced troubleshooting section, you will learn techniques to investigate many of the common issues that can affect environment health and how to solve issues more effectively. You will leave this course with a...

$5000.00

CCSA+CCSE | Check Point Cyber Security Administrator and Expert Boot Camp

Online and Virtual through Layer 8

This special CCSA and CCSE bundle covering Check Point Certified Security Administrator and Security Expert content (R80.40) validates and enhances your skills to manage Check Point advanced security management systems and to administer IT security fundamental tasks. CCSA Course Outline Identify key components and configurations Create and confirm administrator users for the domain Validate existing licenses for products installed on your network Create and modify Check Point Rule Base objects Demonstrate how to share a layer between Security Policies Analyze...

WordPress Appliance - Powered by TurnKey Linux