Welcome to the Intel® Network Academy – a comprehensive training program on network transformation. In this program, we will be covering the topic areas of software defined infrastructure (SDI) network functions virtualization (NFV), software-defined networking (SDN) and beyond. Network Transformation 102 covers topics such as VNF Operations & Development, … [Read more...] about Intel' Network Academy – Network Transformation 102
Information Technology
Microsoft Azure Cosmos DB
In this course, you will learn the fundamentals of database concepts in a cloud environment, get basic skilling in cloud data services, and build your foundational knowledge of cloud data services within Microsoft Azure. You will explore non-relational data offerings, provisioning and deploying non-relational databases, and non-relational data stores with Microsoft Azure. This … [Read more...] about Microsoft Azure Cosmos DB
Using Python to Interact with the Operating System
By the end of this course, you’ll be able to manipulate files and processes on your computer’s operating system. You’ll also have learned about regular expressions -- a very powerful tool for processing text files -- and you’ll get practice using the Linux command line on a virtual machine. And, this might feel like a stretch right now, but you’ll also write a program … [Read more...] about Using Python to Interact with the Operating System
Transacting on the Blockchain
Today, large intermediaries establish trust in our economy and control the movement, storage, and allocation of money and assets. The status quo, however, is rife with inefficiencies. In this course, we’ll address the many challenges of the status quo and discuss how cryptoassets, smart contracts, new identity systems, and new financial business models can help overcome … [Read more...] about Transacting on the Blockchain
The GRC Approach to Managing Cybersecurity
Managing cybersecurity is about managing risk, specifically the risk to information assets of valued by an organization. This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical … [Read more...] about The GRC Approach to Managing Cybersecurity