Thank you. You should be receiving a reset link at the email address you provided shortly.
Learn how to design, manage and secure assets in the cloud. This boot camp teaches you impactful best practices around cloud data, applications, and infrastructure—and prepares you to become a Certified Cloud Security Professional (CCSP).
The Information Systems Audit and Control Association (ISACA) Certified Information Systems Auditor (CISA) Boot Camp is a five-day training course focused on preparing you for the ISACA CISA exam. You will leave with the knowledge and domain expertise needed to take the CISA exam.
The RMF credential focuses on the fundamentals of manufacturing robotics and provides a starting point for any career pathway a candidate may pursue in the field of robotics.
This boot camp is for cloud and IT operations administrators, IT and cybersecurity professionals, cloud developers and entry-level cloud engineers, or anyone interested in learning how to deploy and manage cloud infrastructure.
Managing cross-functionally brings a unique set of leadership challenges. This process procure-to-pay (P2P) course highlights best practices from organizations that have aligned with P2P, sharing actionable strategies you can use to improve the performance of your team.
This course is intended for Azure and Microsoft server security professionals and those who are looking to take and pass the AZ-500: Microsoft Azure Security Technologies exam.
The CMfgE course is ideal for individuals who have advanced manufacturing engineering experience, who are in a leadership position, or who support manufacturing practices at a manufacturing organization.
This additive manufacturing certification course focuses on the basics of additive manufacturing, including a comprehensive overview of additive manufacturing, the seven additive manufacturing technologies, and basic safety guidelines.
This course is intended for network engineers, system engineers, network administrators, and those looking to attain their CCNP Enterprise certification.
Learn how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended using the EC-Council's Certified Penetration Tester (CPENT) program.
A password reset link has been sent to the email address you provided.