--
{"text":"Chinese (Traditional Han, Taiwan)","icon":"flagstrap-icon flagstrap-tw"}
{"text":"Swedish (Sweden)","icon":"flagstrap-icon flagstrap-se"}
{"text":"German","icon":"flagstrap-icon flagstrap-de"}
{"text":"Polish","icon":"flagstrap-icon flagstrap-pl"}
{"text":"Portuguese (Brazil)","icon":"flagstrap-icon flagstrap-br"}
{"text":"Portuguese","icon":"flagstrap-icon flagstrap-pt"}
{"text":"Turkish","icon":"flagstrap-icon flagstrap-tr"}
{"text":"Hindi (India)","icon":"flagstrap-icon flagstrap-in"}
{"text":"Arabic (Saudi Arabia)","icon":"flagstrap-icon flagstrap-sa"}
{"text":"Korean (South Korea)","icon":"flagstrap-icon flagstrap-kr"}
{"text":"Chinese","icon":"flagstrap-icon flagstrap-cn"}
{"text":"Spanish","icon":"flagstrap-icon flagstrap-es"}
{"text":"Czech","icon":"flagstrap-icon flagstrap-cz"}
{"text":"Italian","icon":"flagstrap-icon flagstrap-it"}
{"text":"Russian","icon":"flagstrap-icon flagstrap-ru"}
{"text":"Dutch","icon":"flagstrap-icon flagstrap-nl"}
{"text":"Danish (Denmark)","icon":"flagstrap-icon flagstrap-dk"}
{"text":"Spanish (Chile)","icon":"flagstrap-icon flagstrap-cl"}
{"text":"Thai","icon":"flagstrap-icon flagstrap-th"}
{"text":"Japanese (Japan)","icon":"flagstrap-icon flagstrap-jp"}
{"text":"Sinhala","icon":"flagstrap-icon flagstrap-si"}
{"text":"Hebrew (Israel)","icon":"flagstrap-icon flagstrap-il"}
{"text":"English (United States)","icon":"flagstrap-icon flagstrap-us"}
{"text":"French","icon":"flagstrap-icon flagstrap-fr"}
{"text":"Greek (Greece)","icon":"flagstrap-icon flagstrap-gr"}
Home
Trending
Sign In
Audios and Videos
Videos
Audios
Channels
Browse Channels
Categories
Default
105
Ebook Quality Assurance
33
Learning.moodle.3.5
36
Awareness Security Fundamentals
1
Commvault and Metallic
1
CyberSecurity
1
DevSecOps
41
DevSecOps Git vs Cloud Computing
13
Exchange Administrator
46
Hand On Labs
4
ITSM_ITAM_SIEM
3
IBM IT Support Training
3
Microsoft 365 vs BIM
1
QuizMaker in LMS
1
showcase
1
veeam backup
7
VMware vCenter Appliance 7x
4
vSAN ICM 6.7
23
vSphere Optimize vs Scale 7.x
1
Play a Link
Help
About
Contact
PhD. Le Toan Thang
Subscribe
2
PhD. Le Toan Thang
cybersecurity
Subscribe
0
Chuyên triển khai, đào tạo và cung cấp sản phẩm kiến thức về Hệ thống quản lý bảo mật thông tin (ITSM/SIEM/SOC) theo tiêu chuẩn NIS 2,ISO 27001
0:04:30
4- Email security-20221009_120908
HD
8 Views
6 days ago
cybersecurity
Add to
Want to watch this again later?
Sign in to add this video to a playlist.
Login
atcom
Subscribe
1
Le Toan Thang
Subscribe
2
Admin of AT.COM
glpi-itsm
Subscribe
2
ITSM mastering
backup.restore
Subscribe
0
Commvault, Data Domains, Veembu, Veeam Backup or VMware VDP with Replicate, Recovery vs Restore
ELK
Subscribe
0
Security information and event management, or SIEM, is a security solution that helps organizations recognize and address potential security threats and vulnerabilities before they have a chance to disrupt business operations
Apache CloudStack
Subscribe
0
Apache CloudStack: https://www.shapeblue.com/vmware-to-apache-cloudstack-migration-guide/, https://github.com/shapeblue/cloudstack,
labs.hol
Subscribe
0
Hand On Labs and Hand on Documents for Training, Learn Technologies
Data
Subscribe
0
1
(current)
2
This website uses cookies
🍪 so we can provide you with the best user experience. Without these cookies, the website simply would not work.
I agree