Learning Outcomes: Upon completing this course, participants will: 1) Understand the fundamentals and evolution of 5G technology and its impact on various industries. 2) Recognize the pivotal role of edge computing in enhancing business agility and efficiency. 3) Explore real-world case studies showcasing the integration of 5G within digital transformation initiatives. 4) Gain … [Read more...] about Business Considerations for 5G with Edge, IoT, and AI
Computer Security and Networks
Enterprise Firewall Administrator
In this course, you will learn how to implement and centrally manage an enterprise security infrastructure composed of multiple FortiGate devices. … [Read more...] about Enterprise Firewall Administrator
Persistent Memory Technology – Introduction and Deployment
Embark on a dynamic learning journey through this course. In the first module, explore the intricacies of Persistent Memory (PMEM), unraveling its fundamental concepts, characteristics, and operating system support. Transition seamlessly into the second module, mastering transactional concepts, optimizing hardware configurations, and discerning between volatile and persistent … [Read more...] about Persistent Memory Technology – Introduction and Deployment
Network Principles in Practice: Linux Networking
Welcome! In this course, titled "Network Principles in Practice: Linux Networking," we delve into the dynamic domain of Linux Networking, featuring a robust set of features essential for contemporary networked systems. Departing from traditional approaches, our emphasis is on practical application over foundational knowledge. Throughout the course, you'll explore the … [Read more...] about Network Principles in Practice: Linux Networking
Implement Platform Protection
Are you a security engineer who wants to learn how to lock down the infrastructure and network resources running in your Azure environment? Then, Implement Platform Protection is the right course for you! Throughout this course, you will explore perimeter security, network security, and host and containers security, along with various security components, tools, solutions, … [Read more...] about Implement Platform Protection