55399 Implementing and Managing Microsoft Intune (UT-Microsoft-55399)
This three-day instructor-led course is aimed at modern device management professionals looking to manage their enterprise devices using Microsoft Intune.
VIEW DETAILS
AZ-1002 Configure secure access to your workloads using networking with Azure Virtual Network (UT-Azure-AZ-1002)
In this learning path, you practice configuring secure access to workloads using Azure networking.
VIEW DETAILS
AZ-1003 Secure storage for Azure Files and Azure Blob Storage (UT-Azure-AZ-1003)
In this learning path, you practice storing business data securely by using Azure Blob Storage and Azure Files.
VIEW DETAILS
AZ-1004 Deploy and configure Azure Monitor (UT-Azure-AZ-1004)
In this learning path, you practice implementing Azure Monitor to collect, analyze and act on monitoring telemetry from Azure environments.
VIEW DETAILS
Advanced Root Cause Analysis (UT-Adv-RCA)
This 2-day course will help students have a general understanding of a structured problem determination approach, which they can then apply in their daily work.
VIEW DETAILS
Business Analysis Modeling Essentials (UT-BA-ME)
This 2-day course presents several common Business Analysis (BA) modeling techniques to help students elicit and analyze requirements.
VIEW DETAILS
CMMC for Business Professionals: A Practical Guide to Getting Ready for CMMC (UT-Sec-CMMC-PG)
This course provides a complete review of the key elements of this important program and will entitle you to a CMMC Trailblazer badge.
VIEW DETAILS
COBIT 2019 Foundation (UT-Sec-C19F)
This 2-day course COBIT 2019 Foundation course is designed as an introduction to COBIT 2019 and enables you to understand how an integrated business framework for the governance and management of enterprise IT can be utilized.
VIEW DETAILS
Certified Agile Service Manager (CASM)® (UT-CASM)
This 2-day course provides an introduction to Agile Service Management, the application, and integration of agile thinking into service management processes and process design projects.
VIEW DETAILS
Certified Ethical Emerging Technologist TM (CEET) (UT-Sec-CEET)
This 3-day course provides the tools to identify and manage common ethical risks in the development of emerging data-driven technologies.
VIEW DETAILS
Certified Information Security Manager (CISM) (UT-Sec-CISM)
In this 3-day course, students will establish processes to ensure that information security measures align with established business needs.
VIEW DETAILS
Certified Internet of Things Security Practitioner (CIoTSP) (UT-CIoTSP)
This 3-day course presents an approach for managing the security and data privacy of IoT throughout the entire lifecycle.
VIEW DETAILS
Certified in Risk and Information Systems Control (CRISC) (UT-Sec-CRISC)
The CRISC course is designed for those who have experience with risk identification, assessment, and evaluation; risk response; risk monitoring; information systems control design and implementation; and information systems control monitoring.
VIEW DETAILS
Change Management Foundation (UT-Pro-CMF)
This 3-day course provides an independent benchmark for the professional knowledge expected of an effective change manager.
VIEW DETAILS
Change Management Practitioner (UT-Pro-CMP)
The purpose of the Practitioner certification is to confirm whether the candidate has achieved sufficient know-how to apply and tailor Change Management guidance in a given organizational change situation.
VIEW DETAILS
CompTIA Advanced Security Practitioner (CASP+) (UT-CASP+)
In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.
VIEW DETAILS
CompTIA Cybersecurity Analyst (CySA+) (UT-CompTIA-CySA+)
This 5-day course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.
VIEW DETAILS
CompTIA Data+ (UT-CompTIA-Data+)
CompTIA Data+ is an early-career data analytics certification for professionals tasked with developing and promoting data-driven business decision-making.
VIEW DETAILS
CompTIA PenTest+ (PenTest) (UT-CompTIA-PenTest+)
In this 5-day course, students will be introduced to some general concepts and methodologies related to pen testing and will work their way through a simulated pen test for a fictitious company.
VIEW DETAILS
CompTIA Project+ (UT-CompTIA-Project+)
In this 5-day course, students will apply recognized practices of project management and understand a project’s life cycle and roles and skills necessary to effectively initiate, plan, execute, monitor and control, and close a project.
VIEW DETAILS
CompTIA Security+ (UT-CompTIA-Security+)
In this 5-day course, students will build on their knowledge of and professional experience with security fundamentals, networks, and organizational security.
VIEW DETAILS
CyberSAFE: End User Security (UT-CyberSAFE)
A half day course designed for all users of computers, mobile devices, networks, and the Internet, to enable them to use technology more securely and minimize digital risks, regardless of technical ability.
VIEW DETAILS
Data Ethics for Business Professionals (DEBIZ ™) (UT-DEBIZ)
This 1-day course provides business professionals and consumers of technology core concepts of ethical principles, how they can be applied to emerging data driven technologies and the impact to an organization which ignores ethical use of technology.
VIEW DETAILS
Data Science for Business Professionals (DSBIZ ™) (UT-DSBIZ)
This half-day course help businesses mold raw data into information that facilitates decisions to improve and expand the success of the business.
VIEW DETAILS
DevSecOps Foundation (UT-DevSecOps-FOUNDATION)
In this 2-day course, students will gain a solid understanding of the leadership requirements for successful DevOps adoption at both the tactical and strategic levels for those who help design, influence, implement and motivate the cultural transformation.
VIEW DETAILS
EC-Council Certified Secure Computer User (CSCU) v3 (UT-Sec-CSCU)
The CSCU program is designed to educate students on the safe operation of computers, devices, and networks by focusing on the more practical aspects of networking and security, allowing them to expand their skills.
VIEW DETAILS
EC-Council Certified Threat Intelligence Analyst (CTIA) (UT-Sec-CTIA)
The aim of this 3-day course is to help organizations hire qualified cyber intelligence trained professionals to identify and mitigate business risks by converting unknown threats into quantifiable threat entities and stop them in their tracks.
VIEW DETAILS
Healthcare Information Security and Privacy Practitioner (HCISPP) (UT-HCISPP)
This 3-day course will help ensure students successfully prepare for the HCISPP exam and enhance their overall competencies in healthcare security and privacy.
VIEW DETAILS
Incident Response for Business Professionals (IRBIZ ™) (UT-IRBIZ)
This course covers incident response methods and procedures are taught in alignment with industry frameworks such as US-CERT’s NCISP (National Cyber Incident Response Plan), and Presidential Policy Directive (PPD) 41 on Cyber Incident Coordination Policy.
VIEW DETAILS
MS-500 Microsoft 365 Security Administrator (UT-Microsoft-365-Security)
The 4-day course covers user password protection, multi-factor authentication, how to enable Azure Identity Protection, how to setup and use Azure AD Connect, and introduces students to conditional access in Microsoft 365.
VIEW DETAILS
SC-100T00 Microsoft Cybersecurity Architect (UT-Microsoft-SC-100T00)
This 4-day course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications.
VIEW DETAILS
SC-200T00 Microsoft Security Operations Analyst (UT-Microsoft-SC-200T00)
In this 4-day course, students will learn how to mitigate cyberthreats using these technologies.
VIEW DETAILS
SC-300T00 Microsoft Identity and Access Administrator (UT-Microsoft-SC-300T00)
The Microsoft Identity and Access Administrator 4-day course explores how to design, implement, and operate an organization’s identity and access management systems by using Azure AD.
VIEW DETAILS
SC-400T00 Administering Information Protection and Compliance in Microsoft 365 (UT-Microsoft-SC-400T00)
The 4-day course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
VIEW DETAILS
SC-5001 Configure SIEM security operations using Microsoft Sentinel (UT-Microsoft-SC-5001)
Get started with Microsoft Sentinel security operations.
VIEW DETAILS
SC-5002 Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls (UT-Microsoft-SC-5002)
This learning path guides you in securing Azure services and workloads using Microsoft Cloud Security Benchmark controls in Microsoft Defender for Cloud via the Azure portal.
VIEW DETAILS
Security Engineering on AWS (UT-Security-Engineering-on-AWS)
This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud.
VIEW DETAILS
Transitioning into Leadership for an IT Manager (UT-Transitioning-into-Leadership-for-an-IT-Manager)
This course will teach students the skills and behaviors needed to successfully transition into an IT manager role.
VIEW DETAILS