Back to Courses









Information Technology Courses - Page 120
Showing results 1191-1200 of 1471
Cloud Storage: Qwik Start - Cloud Console
This is a self-paced lab that takes place in the Google Cloud console. This hands-on lab shows you how to perform basic tasks in Cloud Storage using the Google Cloud Console. Watch the short video Google Cloud Storage: Massive Scalability Plus More.
Monitoring and Logging for Cloud Functions
This is a self-paced lab that takes place in the Google Cloud console.
In this hands-on lab we take a look through some of the information provided by the Cloud Monitoring tools, and teach some of the concepts you will need to know to take advantage of Cloud Monitoring effectively.
Check Point Jump Start: Cloud Security
Check Point CloudGuard, a comprehensive cloud security portfolio, is designed to prevent the latest fifth generation (Gen V), multi-vector cyberattacks targeting enterprise cloud services
Section 1: Overview of CloudGuard Product line
In this course you will learn about cloud security challenges and what different Check Point CloudGuard product line can be used to protect your cloud environment.
How to Secure your Cloud Environment
Cloud Challenges
Security in the Cloud
What is CloudGuard
Security with CloudGuard
Section 2: CloudGuard Network security solution
In this course we will analyze how CloudGuard Network Security product solution is used to security your cloud posture.
Understanding Cloud Security Fundamentals
CloudGuard Solutions
CloudGuard Components
CloudGuard Segmentation
Section 3: CloudGuard Network Security Product Labs
In this course we will learn how to deploy a CloudGuard Network Security solution in the Azure Cloud.
Deploying a CloudGuard Network Security Solution
Building an Azure Private Cloud Environment
Deploy Check Point R80.40 Management Server
Deploy CloudGuard Gateway
Deploy a Web Server Part1
Deploy a Web Server Part2
Connecting CloudGuard Controller
Check Point Company Overview
Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
With Check Point Infinity, the only consolidated cyber security solution across cloud, networks, endpoints, mobile and IoT, we are continuously pioneering cyber security innovation with the most advanced AI-based threat Intelligence and prevention technologies, unified security management, and cloud security automation to help protect organizations from 6th generation of cyber attacks.
With over 3,500 security experts, a world-acclaimed research and intelligence unit, and the broadest ecosystem of business and technology partners, we protect over 100,000 organizations of all sizes across all industry verticals in 88 countries to achieve allow better experiences for in a safer digital world.
Creating and Populating a Bigtable Instance
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you create a Bigtable instance and table and then use a Dataflow template to populate the table from pre-generated data files on Cloud Storage.
Introduction to Budgets in Microsoft Azure Cost Management
By the end of this project, you will create Budgets in Azure Cost management scoped to both Subscriptions and Resource Groups. You will also create a budget using an Azure Resource Manager (ARM) template and examine Cost Analysis and Alerts.
An Azure account will be required to complete the tasks within this project and the steps required to create an account are detailed at the outset of the project.
It should be noted that dependent on your new or existing Azure subscription that some features that will be enabled during this project are dependent on Azure making these features available in the Portal once activated. This may require that the project be paused as features such as Cost Analysis will not become available immediately.
If you enjoy this project, we'd recommend exploring the Microsoft Azure Fundamentals AZ-900 Exam Prep Specialization: https://www.coursera.org/specializations/microsoft-azure-fundamentals-az-900
Splunk Knowledge Manager 102
In this course, you will learn how fields are extracted and how to create regex and delimited field extractions. You will upload and define lookups, create automatic lookups, and use advanced lookup options. You will learn about datasets, designing data models, and using the Pivot editor. You’ll improve search performance by creating efficient base searches, accelerating reports and data models, and how to use the tstats command.
Use Google Forms with Google Sheets
This is a self-paced lab that takes place in the Google Cloud console. Google Forms enables users to easily create and share online forms and surveys, and analyze responses in real-time.
Creating a Streaming Data Pipeline With Apache Kafka
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you create a streaming data pipeline with Kafka providing you a hands-on look at the Kafka Streams API. You will run a Java application that uses the Kafka Streams library by showcasing a simple end-to-end data pipeline powered by Apache.
Build a Database from a Relational Model
In this course you will interpret the components of a relational data model, convert that model into a relational database, and then test the database design. The process of database design begins with requirements analysis to determine who will use the new database and how it will be used. The results of the detailed analysis are recorded in an Entity Relationship Diagram (ERD), which documents entities and their attributes, along with the relationships between entities. The ERD (logical design) is then converted into the Relational Model, which serves as the blueprint for the actual creation of a database in a database management system. By the end of this course, you will have used a blueprint—a Relational Model—to create a database using SQLiteStudio. In addition, you will have developed test data and queries to validate the database design represented by the Relational Model.
Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Advanced Junos Concepts (Firewall Filters, IPv6, CoS)
This course will describe some advanced Junos OS concepts such as firewall filters and their use as a means of protecting a device from excessive traffic. An overview of the benefits and purpose of class of service (CoS) will be provided along with the implementation of traffic classification, queuing, and scheduling. Recommended Juniper Networks Technical Assistance Center (JTAC) procedures will be described along with the Juniper tools available online to help manage and support Juniper products. The course will be rounded out with a discussion of Juniper security concepts and components.
Popular Internships and Jobs by Categories
Browse
© 2024 BoostGrad | All rights reserved