Pluralsight Network Insight.

CCT Routing and Switching: Networking Foundations

This course will teach you about network foundations.

The IT Ops Sessions: Observability and Cisco Thousand Eyes

In this IT Ops session, you’ll learn the practice of observability with Cisco Thousand Eyes.

CyberArk Fundamentals

This course will teach you how to implement CyberArk product sets for PAM and Identity.

The IT Ops Sessions: Secure Access Service Edge (SASE): Evolving Networking and Security

In this IT Ops session, you’ll learn how SASE has evolved networking and security to meet todays demands.

Splunk 9: Introduction to Splunk for Security Detection and Monitoring

This course will teach you how to introduce security with the Splunk product set.

Red Hat Certified Specialist in Advanced Automation: Mastering Ansible Tower

This course will teach you advanced Ansible Tower automation techniques.

Red Hat Certified Specialist in Advanced Automation: Ansible Tower Basics

This course will teach you basic Ansible Tower automation techniques.

Red Hat Certified Specialist in Advanced Automation: Ansible Core

This course will teach you advanced Ansible automation techniques.

Securing an OpenShift Cluster

This course will teach you how to implement security in OpenShift.

Implementing Networking in OpenShift

This course will teach you how to implement networking in OpenShift.

Implementing Docker Security

Docker Containers pose a new type of attack surface and security risk to organizations. This course will teach you how to implement Docker Security.

DevOps Foundations: Operational Strategies

This course will teach you the core skills required to implement the DevOp Operational strategies.

Cisco DEVOPS 300-910: Logging, Monitoring, and Metrics

This course will teach you the core skills required to setup and maintain logging, monitoring and metric in a DevOps environments.

Troubleshooting Cisco ACI

This course will teach you how to efficiently troubleshoot the ACI fabric along with the deployment and migrations stages.

Implementing Cisco ACI

In this course, you'll gain knowledge about Implementing Cisco ACI solution and the various ways to optimize the Cisco ACI. The ACI is Cisco's approach to SDN in the data center and is based on a leaf-spine and VXLAN overlay topology.

Designing and Architecting the Cisco ACI

In this course, you'll gain knowledge about the Cisco ACI solution, its core features, and new concepts. The ACI is Cisco's approach to SDN in the data center and is based on a leaf-spine and VXLAN overlay topology.

Designing Cisco SD-WAN Architecture and Components

In this course, you'll gain knowledge about the Cisco SD-WAN solution, its core features, and various use cases. The Cisco SD-WAN is a distributed architecture based consisting of a number of new SD-WAN protocols and components.

SD-WAN Architectures: The Big Picture

In this course, you will gain knowledge about the various SD-WAN architectures, core features, and why we need it. SD-WAN virtualizes the WAN and makes it more agile to be in tune with today's application requirements.

Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture

In this course, you will gain the knowledge to implement the new approach to securing your network infrastructure and applications using the software-defined perimeter approach to zero trust (SDP). SDP makes protected assets invisible.

Zero Trust Networking (ZTN): The Big Picture

Essentially, with Zero Trust Networking, the network is entirely dark to everything and everyone until the administrator turns the lights on. You will go through technologies and introduced to new networking and security architectures.