• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

56229 Courses delivered Online

Certified Information Privacy Manager (CIPM)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programmes Overview Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program. Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. Introduction to privacy program management Privacy program management responsibilities Accountability in privacy program management Privacy governance Considerations for developing and implementing a privacy program Position of the privacy function within an organization Role of the DPO Program scope and charter Privacy strategy Support and ongoing involvement of key functions and privacy frameworks Applicable laws and regulations The regulatory environment Common elements across jurisdictions Strategies for aligning compliance with organizational strategy Data assessments Practical processes for creating and using data inventories/maps Generating and applying gap analyses Privacy assessments Privacy impact assessments/data protection impact assessments Vendor assessments Policies Common types of privacy-related policies Policy components Strategies for implementation Data subject rights Operational considerations for communicating and ensuring data subject rights Privacy notice Choice and consent Access and rectification Data portability Erasure Training and awareness Developing privacy training and awareness programs Implementing privacy training and awareness programs Protecting personal information Holistic approach to protecting personal information Privacy by design Data breach incident plans Planning for a data security incident or breach Responding to a data security incident or breach Monitoring and auditing program performance Common practices for monitoring privacy program performance Measuring, analyzing and auditing privacy programs Additional course details: Nexus Humans Certified Information Privacy Manager (CIPM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Manager (CIPM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Manager (CIPM)
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks: Cortex XDR 3.2: Investigation and Response(EDU-262)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Cybersecurity analysts and engineers Security operations specialists Overview Successful completion of this instructor-led course with hands-on lab activities should enable participants to: Investigate and manage incidents Describe the Cortex XDR causality and analytics concepts Analyze alerts using the Causality and Timeline Views Work with Cortex XDR Pro actions such as remote script execution Create and manage on-demand and scheduled search queries in the Query Center Create and manage the Cortex XDR rules BIOC and IOC Working with Cortex XDR assets and inventories Write XQL queries to search datasets and visualize the result sets Work with Cortex XDR's external-data collection This instructor-led course teaches you how to use the Incidents pages of the Cortex XDR management console to investigate attacks. It explains causality chains, detectors in the Analytics Engine, alerts versus logs, log stitching, and the concepts of causality and analytics. You will learn how to analyze alerts using the Causality and Timeline Views and how to use advanced response actions, such as remediation suggestions, the EDL service, and remote script execution. Multiple modules focus on how to leverage the collected data. You will create simple search queries in one module and XDR rules in another. The course demonstrate how to use specialized investigation views to visualize artifact-related data, such as IP and Hash Views. Additionally, it provides an introduction to XDR Query Language (XQL). The course concludes with Cortex XDR external-data collection capabilities, including the use of Cortex XDR API to receive external alerts. This class is powered by Cloud Harmonics. Course Outline Module 1 - Cortex XDR Incidents Module 2 - Causality and Analytics Concepts Module 3 - Causality Analysis of Alerts Module 4 - Advanced Response Actions Module 5 - Building Search Queries Module 6 - Building XDR Rules Module 7 - Cortex XDR Assets Module 8 - Introduction to XQL Module 9 - External Data Collection

Palo Alto Networks: Cortex XDR 3.2: Investigation and Response(EDU-262)
Delivered OnlineFlexible Dates
Price on Enquiry

SAP Real-time Replication with SAP LT Replication Server (SLT100)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Technology Consultant System Administrator Application Consultant Overview This course will prepare you to: Set up SLT configurations, replicate data into different targets (such as SAP HANA, SAP BW or Central Finance) and monitor the data replication. In this course, you will learn how to use the trigger based real time data replication technology of the SAP LT Replication Server (SLT). SAP Landscape Replication Server Overview Explaining Positioning and Key Concepts Identifying Use Cases Understanding SLT as Part of the DMIS Product Family SAP Landscape Transformation Server Introduction Understanding the Architectural Concept Explaining the Landscape Strategy and Sizing Aspects Outlining the SLT Installation Procedure Replication to SAP HANA Setting Up Data Replication Executing Data Replication Understanding Advanced Replication Settings Outlining Operations and Monitoring Describing SLT Handling in Special Cases Replication to SAP BW Providing a Scenario Overview Explaining Open Data Provisioning (ODP) Describing Table-Based Replication Comparing Table-Based Replication and ODP Replication to SAP Data Services Explaining SAP Data Services and Architecture Describing the Setup of Replication to SAP Data Services Replication to ABAP Systems Describing the Architecture for Replication into an ABAP System Outlining the Setup for Replication into an ABAP System Replication to Non-SAP Databases Describing the Architecture for Replication to Non-SAP Databases Understanding the Setup of ABAP to Non-ABAP Replication Replication to Central Finance Describing the Architecture for Replication to Central Finance Understanding the Setup and Configuration of Replication to Central Finance SAP Landscape Transformation Replication Server Summary Providing a Summary of the SAP Landscape Transformation Replication Server SAP Landscape Transformation Replication Server 3.0 and Recent Updates Outlining SAP Landscape Transformation Replication Server 3 Updates Additional course details: Nexus Humans SAP Real-time Replication with SAP LT Replication Server (SLT100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP Real-time Replication with SAP LT Replication Server (SLT100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SAP Real-time Replication with SAP LT Replication Server (SLT100)
Delivered OnlineFlexible Dates
Price on Enquiry

Linux Professional Institute Certification (LPIC-2) 202

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-2) 202 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: configure BIND to function as an authoritative and as a recursive, caching-only DNS server install and configure a web server install and configure a proxy server, including access policies, authentication and resource usage set up a Samba server for various clients configure a DHCP server configure PAM to support authentication using various available methods perform queries and updates to an LDAP server configure a basic OpenLDAP server including knowledge of LDIF format and essential access controls manage an e-mail server, including the configuration of e-mail aliases, e-mail quotas and virtual e-mail domains configure an FTP server for anonymous downloads and uploads receive security alerts from various sources, install, configure and run intrusion detection systems and apply security patches and bugfixes configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections. This course prepares students to take the 202 exam of the LPI level 2 certification. To gain LPIC-2 certification, an individual should have an active LPIC-1 certification. Domain Name Server Basic DNS server configuration Create and maintain DNS zones Securing a DNS server HTTP Services Basic Apache configuration Apache configuration for HTTPS Implementing Squid as a caching proxy Implementing Nginx as a web server and a reverse proxy File Sharing Samba Server Configuration NFS Server Configuration Network Client Management DHCP configuration PAM authentication LDAP client usage Configuring an OpenLDAP server E-Mail Services Using e-mail servers Managing E-Mail Delivery Managing Mailbox Access System Security Configuring a router Managing FTP servers Secure shell (SSH) Security tasks OpenVPN Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC-2) 202 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC-2) 202 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Linux Professional Institute Certification  (LPIC-2) 202
Delivered OnlineFlexible Dates
Price on Enquiry

Creative Problem Solving

By Nexus Human

Duration 1 Days 6 CPD hours Overview Understand problems and the creative problem solving processIdentify types of information to gather and key questions to ask in problem solving Identify the importance of defining a problem correctlyIdentify and use four different problem definition toolsWrite concrete problem statementsUse basic brainstorming tools to generate ideas for solutionsEvaluate potential solutions against criteria, including cost/benefit analysis and group votingPerform a final analysis to select a solutionUnderstand the roles that fact and intuition play in selecting a solutionUnderstand the need to refine the shortlist and redefine itUnderstand how to identify the tasks and resources necessary to implement solutionsEvaluate and adapt solutions to reality This workshop will give students an overview of the creative problem solving process, as well as key problem solving tools that they can use every day. Skills such as brainstorming, information gathering, & analyzing data will be covered during class. Getting Started Workshop Objectives The Problem Solving Method What is a Problem? What is Creative Problem Solving? What are the Steps in the Creative Solving Process? Case Study Module Two: Review Questions Information Gathering Understanding Types of Information Identifying Key Questions Methods of Gathering Information Case Study Module Three: Review Questions Problem Definition Defining the Problem Determining Where the Problem Originated Defining the Present State and the Desired State Stating and Restating the Problem Analyzing the Problem Writing the Problem Statement Case Study Module Four: Review Questions Preparing for Brainstorming Identifying Mental Blocks Removing Mental Blocks Stimulating Creativity Case Study Module Five: Review Questions Generating Solutions (I) Identifying Mental Blocks Removing Mental Blocks Stimulating Creativity Case Study Module Five: Review Questions Generating Solutions (II) The Morphological Matrix The Six Thinking Hats The Blink Method Case Study Module Seven: Review Questions Analyzing Solutions Developing Criteria Analyzing Wants and Needs Using Cost/Benefit Analysis Case Study Module Eight: Review Questions Selecting a Solution Doing a Final Analysis Paired Comparison Analysis Analyzing Potential Problems Case Study Module Nine: Review Questions Planning Your Next Steps Identifying Tasks Identifying Resources Implementing, Evaluating, and Adapting Case Study Module Ten: Review Questions Creating a Performance Plan Planning the Follow-Up Meeting Celebrating Successes Identifying Improvements Case Study Module Eleven: Review Questions Wrapping Up Words from the Wise Lessons Learned

Creative Problem Solving
Delivered OnlineFlexible Dates
Price on Enquiry

BA17 - Advanced Root Cause Analysis

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview At the completion of this course, you should be able to:Identify the different types of tools and techniques availableApply change management successfullyReview what to look for when applying business case thinking to Root Cause AnalysisDevelop a process to systematically approach problems Problem determination skills cannot be acquired by reading a book. They mostly come from experience. After this course, you will have a general understanding of a structured problem determination approach, which you can then apply in your daily work. RCA Foundation Concepts and Objectives Section Learning Objectives Discuss Definitions ? IT Perspective Discuss What is a problem and why do they exist? Exercise 1a: Why is RCA important What is Root Cause? RCA Benefits and Approaches Exercise 1b: Why are multiple approaches important? Event and Casual Analysis Exercise 1c: Apply Event and Causal Analysis Event and Causal Analysis: Exercise 1c Worksheet RCA Tools for each approach Exercise 1D: Prepare for Case Study Section Summary and Conclusions Enhance Use of RCA Tools Why use a Particular Method Tool: Change Analysis Change Analysis Examples Exercise 2a: Apply Change Analysis Exercise 2b: Change Analysis Worksheet Tool: How to Resolve Conflict Tool: 5 Why?s Example Learning Management Problem Exercise 2b: Apply 5 Why?s Sequence-of-Events Exercise 2b: Worksheet Tool: Cause and Effect Exercise 2c: Apply Cause and Effect Exercise 2c: Cause and Effect Worksheet Tool: Fault Tree Analysis Why do we use Fault Tree Analysis? How does it work? Fault Tree Diagram Symbols Example #1 of FTA: Car Hits Object Exercise 2D: Apply Fault Tree Analysis Tool: Failure Modes and Effects Analysis (FMEA) Example: Failure Modes and Effects Analysis Exercise 2E: Apply FMEA Tool: Design / Application Review Exercise 2d: Apply Design/Application Review Section summary & conclusions Problem Resolution & Prevention Section Objectives The Secret of Solving Problems A Note about Statistical Control A Note about Fire Fighting Technique: Business Process Mapping Example: IGOE Exercise 3A: Problem as IGOE Exercise 3A: IGOE Template Technique: Lean Six Sigma and DMAIC Lean Six Sigma Benefits Exercise 3B: Apply Lean Six Sigma Importance of Understanding the Business Process The Business Process Mandate Technique: Process Modeling Graphical Notation Standard (BPMN) What is Business Process Modeling Notation (BPMN)? Benefits of BPMN Basic Components of BPMN Exercise 3C: Use BPMN to Document a Current State Technique: Business Process Maturity Model Five Levels of Maturity Exercise 3D: Appraise Business Process Maturity Level Section Summary and Conclusions Capability Improvement for RCA Section Learning Objectives Steps in Disciplined Problem Solving RCA as a RCA Process Key RCA Role Considerations Exercise 4A: Apply RCA to RCA Process Sustainable RCA Improvement Organizational Units Process Area Goals, Practices Specific and General Practices Specific Practice Examples Software Maturity Survey Exercise 4B: Apply Strengths, Weakness, Opportunities and Threats (SWOT) to RCA SWOT Analysis Worksheet Recognize the importance of the Change Management component in your RCA implementation Using the ADKAR Model to Communicate Change Review ADKAR© Model ? Awareness of the need for change Desire to participate and support the change Knowledge on how to change Ability to implement required skills and behaviors Reinforcement to sustain the change Exercise 4C: Create an Ability Checklist The ADKAR Model: Reinforcement Exercise 4D: Find two examples of how ADKAR will be different Section Summary and Conclusions Course Summary & Conclusions Plan the Proposal and Business Case Example: 1 Page Business Case Exercise 5A: Creating Action Plans Resource Guide Questions Additional course details: Nexus Humans BA17 - Advanced Root Cause Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA17 - Advanced Root Cause Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA17 - Advanced Root Cause Analysis
Delivered OnlineFlexible Dates
Price on Enquiry

JumpStart to Jira for Administrators | Jira Administration (TTDV7540)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an introductory-level course for Administrators who are new to Jira (this is NOT for experienced Jira admin or users). Students should have a background in basic administration. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment, exploring several practical use cases that provide context as to where and when to use Jira, students will learn about: user management global and project permissions project roles schemes configuration of issue types, workflows, and screens Tracking issues is a critical component of any project management strategy. JIRA provides a web based single repository for creating, tracking and reporting on feature requests, bugs reported, or managing workflow. Geared for administrators new to Jira, JumpStart to Jira for Administrators | Jira Administration is a two-day, hands-on course that explores the most important tasks required to set up Jira, providing students with ample hands-on experience using common administration tasks. This hands-on course enables the Student to administer a JIRA instance and ?learn by doing?. The focus of this course is on Best Practices, and practical skills. Getting started with JIRA Administration JIRA conceptual review Core concepts Terminology Infrastructure JIRA roles Groups vs Roles Overview Project roles Creating a role Project scaling JIRA User management Project Resolution Project status Resolved status Resolution date Schemes Overview Project scope schemes Adding users to schemes Issue type schemes Notification schemes Permission schemes Issue security schemes working with schemes JIRA as a Platform Overview What can be configured Basic JIRA project setup Advanced project setup Workflows Overview Designing a workflow Defining a workflow Implementing a workflow Deploying workflows Workflow events Transitions and sub-tasks Custom Fields Overview Field types Field context Limiting contexts Adding contexts Screens and field configuration Best practices for custom fields User Lifecycle Overview Adding users Adding third-party users Modifying users Deactivating users Remote JIRA Access Overview Emails SQL REST Webhooks XML and RSS Command Line Interface Integrating JIRA with other applications Migrating Data into JIRA Overview Migration steps The CSV importer JIRA cloud migration Summary and Best Practices Looking back at the ?Big Picture? Optional - Jira Certification Prep Review Additional course details: Nexus Humans JumpStart to Jira for Administrators | Jira Administration (TTDV7540) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JumpStart to Jira for Administrators | Jira Administration (TTDV7540) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JumpStart to Jira for Administrators | Jira Administration (TTDV7540)
Delivered OnlineFlexible Dates
Price on Enquiry

Juniper - Introduction to the Junos Operating System (IJOS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the basic design architecture of the Junos OS. Identify and provide a brief overview of Junos devices. Navigate within the Junos CLI. Perform tasks within the CLI operational and configuration modes. Restore a Junos device to its factory-default state. Perform initial configuration tasks. Configure and monitor network interfaces. Describe user configuration and authentication options. Perform secondary configuration tasks for features and services such as system logging (syslog) and tracing, Network Time Protocol (NTP), configuration archival, and SNMP. Monitor basic operation for the Junos OS and devices. Identify and use network utilities. Upgrade the Junos OS. Perform file system maintenance and password recovery on a Junos device. Navigate within the Junos J-Web interface. Explain basic routing operations and concepts. View and describe routing and forwarding tables. Configure and monitor static routing. Configure and monitor OSPF. Describe the framework for routing policy and firewall filters. Explain the evaluation of routing policy and firewall filters. Identify instances where you might use routing policy. Write and apply a routing policy. Identify instances where you might use firewall filters. Write and apply a firewall filter. Describe the operation and configuration for unicast reverse path forwarding (RPF). This three-day course provides students with the foundational knowledge required to work with the Juniper Networks Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Course Outline COURSE INTRODUCTION Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options: The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options: The J-Web Interface User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Routing Policy Routing Policy Overview Case Study: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper Networks? Security Focus A IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration Additional course details: Nexus Humans Juniper - Introduction to the Junos Operating System (IJOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Juniper - Introduction to the Junos Operating System (IJOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Juniper - Introduction to the Junos Operating System (IJOS)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware NSX for Intrinsic Security [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Use NSX segmentation to implement Zero-Trust Security Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware Aria Operations™ for Logs and VMware Aria Operations™ for Networks to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX NDR This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX© for intrinsic security. This course introduces all the security features in NSX, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© NDR?. In addition, this course presents common configuration issues and gives a methodology to resolve them. Course Introduction Introduction and course logistics Course objectives Security Basics Define the concepts related to information security Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX and VMware Identity Manager? Integrate NSX and LDAP Describe the native users and roles in NSX Create and assign custom user roles Explain object-based RBAC in a multitenancy environment Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Configure the distributed firewall to block malicious IPs Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use VMware Aria Operations for Logs and VMware Aria Operations for Networks to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX NDR Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX NDR and its use cases Explain the architecture of NSX NDR in NSX Describe the visualization capabilities of NSX NDR Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware NSX for Intrinsic Security [V4.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware NSX for Intrinsic Security [V4.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware NSX for Intrinsic Security [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry

55234 SharePoint 2016 Site Collections and Site Owner Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for those who provide site collection and site administration and are power users or IT professionals who are tasked with supporting or working within the SharePoint 2016 environment on premise and/or in Office 365. Overview After completing this course, students will be able to: - Design and implement a company portal structure using SharePoint 2016 objects including sites, libraries, lists and pages - Explain the role of security and permissions throughout SharePoint 2016 - Implement guidelines for consistency in building a company portal to aid in the day-to-day administration of content in SharePoint 2016 - Enhance the design and content of a company portal using SharePoint 2016 pages and web parts - Explain the importance of governance for the planning and managing future growth of the - SharePoint 2016 implementation - Identify options to integrate data from other systems such as Microsoft Office, as well as preserve existing data - Explain the role of social networking in SharePoint 2016 and its impact on collaboration This course is intended for power users and IT professionals who are tasked with working within the SharePoint 2016 environment and conduct site collection and site administration. Getting Started with SharePoint 2016 Exploring SharePoint 2016 Site Collection and Site Administrator Roles Defining SharePoint Terminology Navigating a SharePoint Site Interacting with the Ribbon Creating and Editing Basic Content What is Metadata? Versions of SharePoint Standard Enterprise O365 Building a Site Collection with Apps The Structure of SharePoint Creating a Site What does a site template come with? Defining SharePoint Apps Customizing Lists and Libraries Creating/Managing Lists and Libraries through SharePoint Designer Explaining Views on Lists and Libraries Creating Views in Lists and Libraries Modifying Navigation Turning Site Features On/Off Reorganizing a Site using Site Content and Structure feature Lab 1: Creating a Structured Company Portal Lab 2: Creating a List Using SharePoint Designer (Optional) Creating Consistency across Sites Defining Site Columns Defining Content Types Implementing a Taxonomy Using Templates to Promote Consistency Lab 1: Creating Site Columns and Content Types Lab 2: Implementing a Taxonomy Lab 3: Configuring the Content Organizer SharePoint Permissions Explaining Permissions and Security in SharePoint Creating SharePoint Groups Managing Permissions within SharePoint Sharing versus Traditional Security Sharing as different permission levels Lab 1: Managing Permissions in SharePoint Working with Pages and Web Parts Changing the Appearance of the Portal Editing a Page wiki web part Working with Web Parts and App Parts App Parts Content Search Web Part Relevant Documents Content query Table of Contents Pictures Web Part Connections Filter web parts Web parts with Targeting Audience Lab 1: Adding and Configuring Web Parts Lab 2: Connecting Web Parts Lab 3: Applying Themes to Your Company Portal Document and Records Management Basic Content Approval Versioning Check In/Out Holds Retention Policy Document ID Content Organizer Compliance Policy Center Site Template EDiscovery Records Center Lab 1: Working with Advanced Document Management Features Lab 2: Leveraging Records Management to Preserve Data Workflow Alerts Out of the Box Workflow Activating Workflow Features Approval Workflow Creating a Workflow in SharePoint Designer Lab 1: Creating an Approval Workflow from SharePoint Lab 2: Creating a Custom Workflow in SharePoint Designer (Optional) Office Integration Outlook Calendar Contacts Excel Word PowerPoint OneDrive for Business OneNote Access Lab 1: Importing and Exporting Excel Data with SharePoint Lab 2: Linking Outlook and SharePoint Creating Publishing Sites Why use a publishing site? Publishing Pages Enabling Web Content Management Managing the Structure of Web Content Navigating a Site Using Managed Metadata Lab 1: Creating a Rich Publishing Sit Lab 2: Configuring a Publishing Approval Process Lab 3: Implementing a Managed Navigation Site Bridging the Social Gap My Sites Configuring Social Features in SharePoint Posts, Tags and Mentions Creating a Community Site Lab 1: Designing a Social Experience in SharePoint 2016 Lab 2: Creating a Community Site Finding Information Using Search Exploring the Search Features in SharePoint Configuring Search Settings Search Analytics Search Visibility Lab 1: Configuring an Advanced Search Center Planning a Company Portal Using SharePoint Defining SharePoint Governance Working with Information Architecture Implementing Site Hierarchies Discussing the Execution of Governance Site Collection Administrator Settings Exploring Settings for Site Collection Administrators Exploring Settings for Site Administrators Site Closure Policies Additional course details: Nexus Humans 55234 SharePoint 2016 Site Collections and Site Owner Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55234 SharePoint 2016 Site Collections and Site Owner Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55234 SharePoint 2016 Site Collections and Site Owner Administration
Delivered OnlineFlexible Dates
Price on Enquiry