(ISC)², CBK, and CISSP are registered marks of the International Information Systems Security Certification Consortium in the United States and other countries.

Access, Excel, Hyper-V, Outlook, Microsoft, SharePoint, Silverlight, SQL Server, Visual Basic, Win32, Windows, Windows PowerShell and Windows Server are registered trademarks of Microsoft Corporation.

Adobe, Acrobat, Flash and Photoshop are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries

Amazon Web Services is a trademark of Amazon.com, Inc.

Android is a trademark of Google Inc.

APMG-International Change Management, The APMG-International Change Management and Swirl Device logo, APMG-International AgilePM and The APMG-International AgilePM and Swirl Device logo are trademarks of The APM Group Limited.

Certified Ethical Hacker (CEH) is a registered trademark of EC-Council.

Cisco is a registered trademark of Cisco Systems Inc.

CMMI® is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.

IIBA®, the IIBA® logo, BABOK® and Business Analysis Body of Knowledge® are registered trademarks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.

CAPM, Certified Associate in Project Management (CAPM), PMP, Project Management Professional (PMP), PMI-ACP, PMI Agile Certified Practitioner (PMI-ACP), PMBOK, and the R.E.P. Logo are marks of Project Management Institute, Inc.

CBAP® and CCBA® are registered certification marks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.

Certified Business Analysis Professional, Certification of Competency in Business Analysis, Endorsed Education Provider, EEP and the EEP logo are trademarks owned by International Institute of Business Analysis. These trademarks are used with express permission of International Institute of Business Analysis.

COBIT is a trademark of ISACA, registered in the U.S. and other countries.

COBIT® 5 is a trademark of the Information Systems Audit and Control Association® (ISACA®). This product includes COBIT® 5, used by permission of ISACA®. 2012© ISACA®. All rights reserved.

CompTIA A+ and CompTIA Network+ are registered trademarks of the Computing Technology Industry Association, Inc.

CompTIA CASP and CompTIA Cloud Essentials are trademarks of the Computing Technology Industry Association, Inc.

GIAC and associated certifications:  GSEC, GPEN, GXPN, GCFW, GCUX, GCWN, GCIA, GREM are registered trademarks of the SANS Institute

Hadoop is a registered trademark of the Apache Software Foundation.

Hibernate is a registered trademark and servicemark of Red Hat, Inc.

iPad, iPhone, Mac and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries.

ITIL®, PRINCE2® and MSP® are registered trademarks of AXELOS Limited.

JavaScript, JavaServer, JavaServer Pages, Enterprise JavaBeans, MySQL and PL/SQL are trademarks of Oracle Corporation.

Linux is a registered trademark of Linus Torvalds.

Java and Oracle are registered trademarks of Oracle Corporation.

 Palo Alto Networks, PAN-OS, App-ID, Content-ID, Url-ID, GlobalProtect, Wildfire, and Panorama are trademarks of Palo Alto Networks, Inc.

"Python" is a registered trademark of the Python Software Foundation, used by Learning Tree International with permission from the Foundation.

Red Hat and Red Hat Enterprise Linux are registered trademarks of Red Hat, Inc. in the United States and other countries.

Red Hat Middleware, LLC. All rights reserved.

SANS and associated certifications:  GSEC, GPEN, GXPN, GCFW, GCUX, GCWN, GCIA, GREM are registered trademarks of the SANS Institute

SAP Crystal Reports is the registered trademark of SAP AG in Germany and in several other countries.

Scrum Alliance REPSM is a service mark of Scrum Alliance, Inc. Any unauthorized use is strictly prohibited.

TechNow® is a registered trademark of TechNow Incorporated.

The CompTIA Authorized Quality Curriculum logo is a proprietary trademark of CompTIA. All rights reserved.

The Swirl logo™ is a trademark of AXELOS Limited.

Transact-SQL is a trademark of Sybase, Inc.

UNIX is a registered trademark of The Open Group.

VMware is a registered trademark of VMware, Inc. in the United States and/or other jurisdictions.

XML is a trademark of MIT, INRIA or Keio on behalf of the World Wide Web Consortium.

in   
 

Course Overview:
This five-day instructor-led course provides IT professionals with the knowledge and skills required to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students will learn how to plan and implement Windows 10 deployments in large organizations. Students will also learn how to manage the Windows 10 installations after deployment to provide secure identity and data access by using technologies related to User Experience Virtualization (UE-V), Group Policy, Work Folders and Client Hyper-V. To support a variety of device and data management solutions, Microsoft Azure Active Directory (Azure AD), Microsoft Intune, Microsoft Store for Business and Office 365 are used for device management. These services are part of the Enterprise Mobility+ Security, which provides identity and access management, cloud-based device management, application and update management, and more secure data access to information stored both on the cloud and onsite within your corporate network.

Attendees to TN-5315: Configuring Windows Devices will receive TechNow approved course materials and expert instruction.
Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Manage Identity
  • Plan Desktop and Device Deployment
  • Plan and Implement a Microsoft 365 Solution
  • Configure Networking
  • Configure Storage
  • Manage Data Access and Protection
  • Manage Remote Access
  • Manage Apps
  • Manage Updates and Recovery

Comments

Latest comments from students


 

Liked the class?  Then let everyone know!

Course Overview:

The Implementing Cisco Enterprise Wireless Networks (ENWLSI) course gives you the knowledge and skills needed to create a secure wireless network infrastructure and troubleshoot any related issues. You’ll learn how to implement and fortify a wireless network infrastructure using Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.

Attendees to N-515: Implementing Cisco Enterprise Wireless Network (ENWLSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-430 Implementing Cisco Enterprise Wireless Networks (ENWLSI) exam, which is part of the CCNP® Enterprise certification and the Cisco Certified Specialist – Enterprise Wireless Implementation certification.

Dates/Locations:

No Events

Duration: 5 Days

Course Objectives:

  • Implement network settings to provide a secure wireless network infrastructure
  • Implement a secure wireless client and troubleshoot wireless client connectivity issues
  • Implement and troubleshoot QoS in wireless networks
  • Implement and troubleshoot advanced capabilities in wireless network services

Prerequisites:

 

Comments

Latest comments from students


Liked the class?  Then let everyone know!

Course Description:

Artificial Intelligence Essentials (AIE) is a foundational AI literacy certification that builds practical understanding of AI and responsible use

The Artificial Intelligence Essentials (AIE) Course is designed to prepare learners for the newly Artificial Intelligence Essentials (AIE) exam. This hands-on program introduces professionals to core AI concepts, practical tools, and safe real-world applications. It equips learners to understand AI systems, use AI responsibly, and boost productivity across roles and industries

Participants will gain knowledge in understanding how AI systems work, where they are used, how they influence decision-making, and how they should be applied responsibly in everyday, professional, and organizational contexts. The course covers what AI is and what it is not, how data and models drive AI behavior, and how modern AI systems differ from traditional software. Learners develop the ability to interact effectively with AI tools, evaluate AI outputs with informed judgment, and apply responsible practices aligned with privacy, security, and global regulatory expectations.

By the end of the course, learners will be prepared to use AI confidently, safely, and productively while recognizing limitations, ethical risks, and broader societal impacts. It serves as a universal entry point before any technical, managerial, security, or governance specialization in AI.

Course Outline: 

01. Introduction to Artificial Intelligence

02. Everyday AI Tools and Use Cases

03. Building Blocks of AI

04. Prompt Crafting AI-Driven Interactions

05. AI Ethics and Responsible AI

Dates/Locations:

No Events

Certified AI Program Manager (CAIPM) is EC-Council’s professional certification for people responsible for owning AI decisions and driving execution: business, technology, data, and risk.

The Certified AI Program Manager (CAIPM) Course equips you with hands-on expertise across the full spectrum of AI tools, from conversational AI and image generation to code assistants and audio synthesis.

Participants will learn how to evaluate, deploy, and integrate AI tools into enterprise workflows, understanding not just how they work, but how to leverage them for maximum business impact. This course covers how to assess AI readiness across teams and processes, Prioritize AI use cases tied to business outcomes, Design adoption and rollout roadmaps , Coordinate delivery across cross-functional teams, implement governance, Responsible AI, and security controls , and how to track performance and ROI to prove value

By the end of the course, learners will be well-prepared to take the Certified AI Program Manager (CAIPM) exam and demonstrate the ability to own AI initiatives end to end , validate mastery of decision framing and trade-off analysis for AI initiatives and Apply governance, ethics, and risk management principles across the AI lifecycle.

Course Objectives:

•MLOps Principles: Model life cycle management for scalable, production-ready AI
•Use Case Evaluation: ROI-driven assessment and prioritization of AI initiatives
•AI Strategy Frameworks: Enterprise AI roadmapping, portfolio planning, and value prioritization
•AI Investment Justification: Quantifying AI value, ROI, and mission impact for funding decisions
•Change Management: Workforce enablement and stakeholder alignment
•KPI Development: AI metrics, success indicators, and executive dashboards
•AI Governance: Risk, ethics, compliance, and responsible AI principles
•Vendor Evaluation: AI platform and tool selection aligned with enterprise needs

Dates/Locations:

No Events

Prerequisites: Familiarity with generative AI concepts, prompt engineering fundamentals, and AI workflows will help you succeed. 

TN-412: Artificial Intelligence Essentials (AI|E)