Global Knowledge Belgium BV: 625 producten
EC-Council Certified Chief Information Security Officer (CCISO) + Exam voucher [CCISO]
OVERVIEW The Certified CISO (CCISO) program of EC-Council is the first of its kind training and certification program aimed at producing to…
Design and implement cloud-native applications with Microsoft Azure Cosmos DB (DP-420) [M-DP420]
OVERVIEW Learn how to create application using the NoSQL API and SDK for Azure Cosmos DB. This course teaches developers how to create appl…
Develop Solutions for Microsoft Azure (AZ-204) [M-AZ204]
OVERVIEW This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure c…
Manage and extend Microsoft 365 Copilot (MS-40170 [M-MS4017]
OVERVIEW This course examines how administrators can manage and extend Microsoft 365 Copilot to meet their business needs. The course intro…
Draft, analyze, and present with Microsoft 365 Copilot [M-MS4018]
OVERVIEW This course directs users to learn common prompt flows in Microsoft 365 apps including PowerPoint, Word, Excel, Teams, and Outlook…
AWS Security Essentials [GK3337]
OVERVIEW AWS Security Essentials covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and…
Prepare security and compliance to support Microsoft 365 Copilot (MS-40020 [M-MS4002]
OVERVIEW This learning path examines the key Microsoft 365 security and compliance features that administrators must prepare in order to su…
CISM®, Certified Information Security Manager® + Practice questions (QAE) [CISM]
OVERVIEW The Certified Information Security Manager (CISM) training course will help you obtain the CISM certification. This ISACA certific…
Security Engineering on AWS [GK3338]
OVERVIEW Security is a concern for both customers in the cloud, and those considering cloud adoption. An increase in cyberattacks and data …
Microsoft Azure Administrator (AZ-104) [M-AZ104]
OVERVIEW Master the skills needed to become a Microsoft Azure Administrator by diving into identity management, role-based access control, …