Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged administrator

Rss Feed Group items tagged

tech writer

The Nutanix Enterprise Cloud Administration (ECA) | Learning Tree International | Learn... - 0 views

  •  
    The Nutanix Enterprise Cloud Administration (ECA) | Learning Tree International | Learning Tree - This hands-on training course explores the deployment, administration, and troubleshooting of a Nutanix Enterprise Cloud and prepares you for the Nutanix Certified Professional - Multicloud Infrastructure (NCP-MCI) certification. Topics covered include managing and securing a Nutanix cluster, health monitoring and alerts, distributed storage fabric, data resiliency, cluster maintenance, and more.
tech writer

Microsoft Information Protection Administrator Training | SC-400 | Learning Tree | Lear... - 0 views

  •  
    Microsoft Information Protection Administrator Training | SC-400 | Learning Tree | Learning Tree - This course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
tech writer

Microsoft Azure Administration (AZ-104) | Learning Tree - 0 views

  •  
    Microsoft Azure Administration (AZ-104) | Learning Tree - This Microsoft Azure Administration course teaches IT professionals how to administer an Azure infrastructure securely, from implementation to storage monitoring and subscription management, as well as computing and virtual networking capabilities of the Azure cloud environment.
tech writer

ADM100 - System Administration I for SAP S/4HANA and SAP Business Suite | Learning Tree - 0 views

  •  
    ADM100 - System Administration I for SAP S/4HANA and SAP Business Suite | Learning Tree - Attend this SAP ADM100 course & get acquainted with a broad spectrum of administrative activities for AS ABAP-based SAP Systems.
tech writer

Power BI: Administrator in a Day Training | Learning Tree - 0 views

  •  
    Power BI: Administrator in a Day Training | Learning Tree - In this Power BI Administrator in a Day training course, you will learn how to manage the Microsoft Power BI platform within your organization, including how to configure access settings for different users, monitor the usage of the platform, and manage your organization's Power BI license.
tech writer

Microsoft 365 Security Administrator (MS-500) | Learning Tree - 0 views

  •  
    Microsoft 365 Security Administrator (MS-500) | Learning Tree - The Microsoft 365 Security course will prepare you for the MS-500 exam & achieve Microsoft 365 Certified: Security Administrator Associate designation.
tech writer

CWS-215 Citrix Virtual Apps and Desktops 7 Administration On-Premises and in Citrix Clo... - 0 views

  •  
    CWS-215 Citrix Virtual Apps and Desktops 7 Administration On-Premises and in Citrix Cloud | Learning Tree - This foundational administration course covers the aspects of installing, configuring, and managing a Citrix Virtual Apps and Desktops 7 environment, how to manage an on-premises Citrix solution and migrate from an on-premises solution to the cloud using the Citrix Cloud management plane.
tech writer

Systems Operations on AWS | Learning Tree - 0 views

  •  
    Systems Operations on AWS | Learning Tree - This AWS SysOps Administrator course will prepare systems administrators to take the official exam and become an AWS Certified SysOps Administrator - Associate.
tech writer

ESET Mail Security Microsoft Exchange Server - 0 views

  •  
    Mail Security - ESET Mail Security. Spam filter - The spam filter works with our excellent scanning engine, which we are constantly improving and adapting. In this way, ESET Mail Security ensures that spam and other unwanted mail does not reach company mailboxes in the first place. Phishing Protection - Prevents employees from accessing websites known to be phishing sites. Emails containing URLs to such sites are also automatically blocked. Hybrid Office 365 Scan - Protects organizations that are hybrid with Microsoft Exchange. Convenient quarantine management - If an item is moved to the quarantine, the recipient receives a message and can - as well as the responsible administrator - delete or release the corresponding email. Administrators also have the option of receiving regular reports summarizing what has happened in the quarantine area. Unmatched speed - In order not to hinder business processes, a mail security product must work stably and quickly and at the same time be particularly powerful. ESET Mail Security is based on a 64-bit engine that enables even deep scans of large amounts of data to be completed in the shortest possible time. Malware protection - ESET Mail Security offers the highest level of security against dubious or dangerous mail attachments thanks to powerful malware protection. Rule system - Thanks to a wide range of possible rules, administrators can specify exactly which e-mails are automatically filtered and what should be done with them. Quarantine management via browser - If an item is moved to the quarantine, the recipient receives a message and can easily delete or release the corresponding e-mail via the browser. Cluster support - ESET solutions can be interconnected to share configurations, notifications, greylist databases and more. In addition, Windows Failover Clusters and NLB clusters are supported to conveniently manage enterprise-sized networks. Flexible and scalable - The components of ESET Mail Security can be installed
tech writer

Microsoft Windows Server Remote Desktop Services 2016 Device CAL, RDS CAL, Client Acces... - 0 views

  •  
    Multilayer safety technology for reliable work - With the Windows Server 2016 and RDS Device CAL, you will experience a secure operating system whose resources are always and everywhere available. Microsoft has built-in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defense. This multi-level defensive technology includes intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consists, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

Microsoft Windows Remote Desktop Services 2012 Device CAL, RDS CAL, Client Access License - 0 views

  •  
    These features form a desktop and application platform required for session virtualization and Virtual Desktop Infrastructure (VDI) to deploy and manage desktops. The remote connection of employees is handled in this way. RDS CALs are purchased in addition to the conventional CALs. As a result, RDS users can access desktops, applications and many other features of Windows Server from any location via the Internet. Multilayer safety technology for reliable work. With the Windows Server 2012 a RDS Device CAL you experience a secure operating system whose resources are always and everywhere available. Microsoft has built in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defence. This multi-level defensive technology includes the intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consist, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

Microsoft Windows Server Remote Desktop Services 2012 Device CAL, RDS CAL, Client Acces... - 0 views

  •  
    These features form a desktop and application platform required for session virtualization and Virtual Desktop Infrastructure (VDI) to deploy and manage desktops. The remote connection of employees is handled in this way. RDS CALs are purchased in addition to conventional CALs. As a result, RDS users can access desktops, applications, and many other features of Windows Server from any location via the Internet. Multilayer safety technology for reliable work. With the Windows Server 2012 RDS Device CAL, you experience a secure operating system whose resources are always and everywhere available. Microsoft has built-in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defense. This multi-level defensive technology includes intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consists, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

Microsoft Windows Remote Desktop Services 2008, 1 Device CAL - 0 views

  •  
    These features form a desktop and application platform required for session virtualization and Virtual Desktop Infrastructure (VDI) to deploy and manage desktops. The remote connection of employees is handled in this way. RDS CALs are purchased in addition to conventional CALs. As a result, RDS users can access desktops, applications, and many other features of Windows Server from any location via the Internet. Multilayer safety technology for reliable work. With the Windows Server 2008 RDS Device CAL, you experience a secure operating system, whose resources are always and everywhere available. Microsoft has built-in multiple layers of security to detect and thwart attacks. If the attacker overcomes a protective layer, there are other lines of defense. This multi-level defensive technology includes intrusion protection and Windows Defender. In addition, detectors are included that report successful break-ins and minimize potential damage. Virtual machine encryption and smart solutions for administrators contribute to security. The latter consists, among other things, of the Credential Guard against attacks that aim at login data. With features such as Just Enough Administration and Just-In-Time Administration, privileges can be set quickly and securely. Potentially unsafe applications can be isolated using Hyper-V. The numerous security measures also protect RDS connections.
tech writer

Nutanix Advanced Administration and Performance Management V5.15 Training | Learning Tree - 0 views

  •  
    Nutanix Advanced Administration and Performance Management V5.15 Training | Learning Tree - This Nutanix AAPM course covers performance management for Nutanix clusters & how to improve data center performance. Plus, it will prep for the NCAP exam.
tech writer

Microsoft Identity and Access Administrator Training (SC-300) | Learning Tree - 0 views

  •  
    Microsoft Identity and Access Administrator Training (SC-300) | Learning Tree - This course includes identity content for Azure AD, enterprise application registration, conditional access, identity governance, and other identity tools.
tech writer

Citrix Provisioning 7 Administration Training | CWS-316 | Learning Tree - 0 views

  •  
    Citrix Provisioning 7 Administration Training | CWS-316 | Learning Tree - Improve your Citrix Virtual Apps and Desktops image management and performance with Citrix Provisioning.
tech writer

HA200 - SAP HANA 2.0 Installation & Administration Training | Learning Tree - 0 views

  •  
    HA200 - SAP HANA 2.0 Installation & Administration Training | Learning Tree - Attend this SAP HA200 course & learn the database admin tasks such as installing, updating & operating a SAP HANA 2.0 SPS00 database using SAP HANA Cockpit.
tech writer

SharePoint 2019/Online Hybrid Administration | Learning Tree - 0 views

  •  
    SharePoint 2019/Online Hybrid Administration | Learning Tree - This 5-Day Sharepoint 2019 Training brings together an OnPrem environment with the rich features and applications enjoyed by SharePoint Online/O365.
tech writer

Administrative Essentials for New Admins in Lightning Experience Training (ADX201) | Le... - 0 views

  •  
    Administrative Essentials for New Admins in Lightning Experience Training (ADX201) | Learning Tree - This 5-day Administrative Essentials for New Admins in Lightning Experience (ADX201) Training is the core training that ensures your success with Salesforce Lightning.
tech writer

WebSphere Application Server V9 Administration in a Federated Environment (WA599G) | Le... - 0 views

  •  
    WebSphere Application Server V9 Administration in a Federated Environment (WA599G) | Learning Tree - Attend this 2-day, hands-on course & learn to administer IBM WebSphere Application Server V9 in a federated environment. Attend online from anywhere.
1 - 20 of 44 Next › Last »
Showing 20 items per page