Centriq Training Print Logo


December 7 07:46 AM

Blog Banner Graphic


New Classes at Centriq Training in 2018

July 6, 2018 in Corporate IT Training / by Centriq Training

The following are classes that have been added to our schedule this year. Click through on the titles to help you determine which classes you will need to add to your 2018 training plan.

Many of these are so new dates are not posted on the website yet, but they will be shortly. If you are interested in a class and a particular date would work best for you, let your Training Advisor know and we will try to schedule the class on that date!


Integrating On-Premises Core Infrastructure with Microsoft Azure (MS-10992)

This 3-day instructor-led course covers a range of components, including Azure Compute, Azure Storage, and network services that you can benefit from when deploying hybrid solutions. Included are a number of demonstrations and labs that will enable you to develop hands-on skills that are necessary when implementing solutions.

MICROSOFT – Powershell

PowerShell 5.0 and Desired State Configuration (MS-55202)

This two-day instructor-led training course is designed to get you up and running with Desired State Configuration (DSC). DSC goes hand-in-glove with the implementation of DevOps. This is considered a skill set that all operation teams need to master. Developers should be familiar with the technology as well so they may develop DSC Resources to be used in deploying their software.

Windows PowerShell Scripting & Toolmaking (MS-55039)

This five-day instructor-led class teaches students the correct patterns and practices for building reusable, tightly scoped units of automation. This course is intended for IT professionals who are interested in furthering their skills in Windows PowerShell and administrative automation.


Analyzing Data with SQL Server Reporting Services (MS-10990)

This five-day instructor-led course teaches students how to implement a SQL Server 2016 Reporting Services solution for data analysis in an organization. The course discusses how to use the Reporting Services development tools to create and manage reports and implement self-service BI solutions.


Agile/Scrum Bootcamp: Agile Expert & Scrum Master Certification (AG-ASB)

Scrum is one of the Agile frameworks for Project Management. It employs an adaptive and iterative approach for managing projects and product development. It was formulated as a faster, more flexible way to deliver the greatest value in the least amount of time.

Agile Use Case Workshop for Business Analysts (BTC-210)

Throughout this two-day workshop, the focus will be on using agile methods with use cases on real-world problems working in groups.

Adobe Acrobat DC (ADB-ACRO)

Adobe® Acrobat® Pro DC puts the power of the Portable Document Format, literally, at your fingertips. By taking advantage of the functionality and features available in Acrobat, you will ensure the integrity of your electronic documents regardless of who views them, on what devices, or with what operating systems.

Risk Management for Information Systems (RM-100)

This course addresses the broad topic of risk management and how risk, threats, and vulnerabilities impact information systems. Areas of instruction include how to assess and manage risk based on defining an acceptable level of risk for information systems. Elements of a business impact analysis, business continuity plan, and disaster recovery plan will also be discussed.

Effective Business Writing (BTC-101)

In contemporary business environments, information overload makes it necessary for you to communicate clearly and concisely. Trying to make sense of a disorganized email message can be frustrating given the number of emails you have to answer daily. By analyzing your audience, organizing your writing, and employing effective persuasive techniques, your writing will make an impact.

Effective Time Management (BTC-105)

In this one-day workshop, you will learn how to make the most of your time by getting a grip on your workflow and office space, using your planner effectively, and delegating some of your work to other people.

Computer Basics  (MO-CB101)

This half-day course will allow you to become familiar with computers and Microsoft Windows while learning basic computer, mouse and keyboard skills in a supportive classroom environment.


Excel 2013: Data Analysis with Pivot Tables (MO-1316EPT)

Being able to harness the power of advanced PivotTable features and create PivotCharts will help you to gain a competitive edge. You will not only be able to summarize data for you to analyze, but also organize the data in a way that can be meaningfully presented to others. This leads to data-driven business decisions that have a better chance for success for everyone involved.

Microsoft Office OneNote 2013 / OneNote 2016 (MO-1316ON)

Hands on training to create and organize notes, files, pictures and more in a digital notebook with the Desktop App and the Web App. Explore the integration with Outlook and other Microsoft Office products. Learn how to share your notebooks (and password protect sections) with others for viewing or editing.


CompTIA Cloud+ (CLO-200)

You will apply the skills required to evaluate and implement standard deployments. You will implement, maintain, and deliver cloud technologies including network, storage, and virtualization technologies to create cloud solutions. You will manage workload migrations, manage cloud vendors to control costs, use automation and orchestration to bring business value from cloud solutions, and ensure security of cloud implementations through the use of cybersecurity best practices.

CompTIA Cybersecurity Analyst + (CySA+ Test Prep) (CYSA-100)

Introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. Ultimately, the course promotes a comprehensive approach to security aimed toward those on the front lines of defense.


CyberSecurity First Responder (SEC-120)

Designed to assist students in preparing for the CyberSec First Responder (Exam CFR-210) certification examination. What you learn and practice in this course can be a significant part of your preparation.

Cyber Secure Coder (CSC-100)

This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. It will also prepare you for the Cyber Secure Coder (CSC) Exam CSC-110 certification.

Certified Authorization Professional (CAP-100)

The Certified Authorization Professional (CAP) is an information security practitioner who champions system security commensurate with an organization’s mission and risk tolerance while meeting legal and regulatory requirements. CAP confirms an individual’s knowledge, skill, and experience required for authorizing and maintaining information systems within the Risk Management Framework as outlined in NIST SP 800-37 Rev 1.

The CAP certification covers the RMF at an extensive level. It’s the only certification under the DoD8570 Mandate that aligns to each of the RMF steps. It is also a DoD accepted alternative to Risk Management for Information Systems (RM-100). 


F5 Networks Configuring BIG-IP AFM v13: Advanced Firewall Manager (F5-AFM-13)

Students are introduced to the AFM user interface, stepping through various options that demonstrate how AFM is configured to build a network firewall and to detect and protect against DoS (Denial of Service) attacks. Reporting and log facilities are also explained and used in the course labs. Further Firewall functionality and additional DoS facilities for DNS and SIP traffic are discussed.

F5 Networks Configuring BIG-IP APM v13: Access Policy Manager (F5-APM-13)

This course covers three typical deployment scenarios for BIG-IP Access Policy Manager (APM) and is broken into three individual lessons.

F5 Networks Configuring BIG-IP ASM v13: Application Security Manager (F5-ASM-13)

Includes lecture, hands-on labs, and discussion about different ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits.

F5 Networks Configuring BIG-IP DNS v13: Domain Name System (formerly GTM) (F5-DNS-13)

Gives networking professionals a functional understanding of the BIG-IP DNS system as it is commonly used. The course covers installation, configuration, and management of the BIG-IP DNS system, and includes a combination of lecture, discussion, and hands-on labs.

F5 Networks Administering BIG-IP v13 (F5-LTM-NA-13)

Introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed.

F5 Networks Configuring BIG-IP LTM v13: Local Traffic Manager (F5-LTM-NC-13)

Gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps students build the well-rounded skill set needed to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network.

F5 Networks Troubleshooting BIG-IP v13 (F5-LTM-NT-13)

This class provides networking professionals hands-on knowledge of how to troubleshoot a BIG-IP system using a number of troubleshooting techniques as well as troubleshooting and system tools. This course includes lectures, labs, and discussions.


Browse our Class Schedule or contact a Centriq Training Advisor to develop a training plan by completing the following form, sending them an email, or by calling them in Kansas City at 913.322.7062 or St. Louis at 314.644.6400.

  • Hidden
    Show us that you are human to see the submit button – Which letter is missing ABCD_FG?
  • Your use of this Site is subject at all times to our Terms of Use and Privacy Policy. If you do not agree to the terms set out in our Terms of Use and Privacy Policy please do not use the Site.

  • This field is for validation purposes and should be left unchanged.