IT Courses (incl. A+)
AWS Certified SysOps Administrator – Associate
In this course, you’ll learn how to deploy, manage, and operate workloads on AWS, as well as implement security controls and compliance requirements.
IT Courses (incl. A+)
Microsoft 365 Fundamentals (MS-900)
In this course, you’ll dive deep into configuring, implementing, and supporting Microsoft 365 integrated productivity services.
IT Courses (incl. A+)
Getting Started with Information Security
Information security is becoming increasingly crucial for all types of organisations. In this course, you’ll explore key information-security concepts.
IT Courses (incl. A+)
Evaluating and Planning for Security Risks
Information security is crucial for all types of organisations. In this course, you’ll learn about evaluating potential security risks and planning for their mitigation.
IT Courses (incl. A+)
Google Associate Cloud Engineer
This course will prepare you to work with Google’s suite of cloud services that help its users store data and build, test, and deploy apps.…
IT Courses (incl. A+)
Windows Client (MD-100)
This course will teach you how to install, configure, and maintain Microsoft Windows clients within a domain infrastructure and prepare you for Microsoft’s MD-100 certification…
IT Courses (incl. A+)
Managing Modern Desktops (MD-101)
This course will deepen the skills and knowledge needed to implement, configure, manage, and maintain Windows clients in an enterprise environment.
IT Courses (incl. A+)
Cloud Security Fundamentals
This course provides an introduction to cloud security concepts and is ideal for anyone who wishes to learn the core principles of cloud infrastructure, data,…
IT Courses (incl. A+)
Cloud Security Administration
In this course, you’ll learn essential security concepts relating to data and application protection, and you’ll learn how to manage and maintain a secure cloud…
IT Courses (incl. A+)
CyberSecurity 102
In this second course in our series on the core elements of information security, you’ll explore different ways organisations protect their information and systems from…