• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6225 Acro courses delivered Online

ScrumAlliance Certified ScrumMaster (CSM)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This certification is appropriate for anyone who is interested in working as a Scrum Master or for someone who is already a Scrum master in his organization. Scrum Master is an important role in any Scrum team and need not be a technology expert to be effective. Moreover, although Scrum is popular in the IT industry, it can be used effectively across different industries. The SBOK Guide, on which the SMC course is based on, can be used as an effective guide for implementation. Overview The participants will be prepared to take SMC™ certification exam and pass. Also they will be able to apply the concepts in their day to day job. This course guides & teaches Scrum practices to everyone involved in the project; clears impediments for the team; and, ensures that Scrum processes are being followed. Successful candidates will be awarded the Scrum Master Certified (SMC?) certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience. Introduction Course Objectives Course Methodology Certification Schema Exam Format Overview of Agile Agile Manifesto Agile Principles What has Changed Agile Methods Overview of Scrum Definition and brief history of Scrum Why Scrum Scrum vs. Traditional Project Management Benefits of Scrum Overview of A Guide to the Scrum Body of Knowledge (SBOK? Guide) Framework of the SBOK? Guide Who uses the SBOK? Guide How to use the SBOK? Guide Scrum Flow Principles Empirical Process Control Self-organization Collaboration Value-based Prioritization Time-boxing Iterative Development Scrum Aspects Organization Business Justification Quality Change Risk Scrum Phases and Processes Initiate Plan and Estimate Implement Review and Retrospect Release Scaling Scrum Scaling Scrum for Large Projects Scaling Scrum for the Enterprise Transition to Scrum Mapping Traditional Roles To Scrum Maintaining Stakeholder Involvement Importance Of Executive Support

ScrumAlliance Certified ScrumMaster (CSM)
Delivered OnlineFlexible Dates
Price on Enquiry

WB396 IBM Managing Decisions in IBM Operational Decision Manager V8.7.1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for business analysts. Overview After completing this course, you should be able to:Describe the benefits of implementing an Operational Decision Manager solution, and the collaboration that is required between the business and development teamsIdentify the main user roles that are involved in designing and developing an Operational Decision Manager solution, and the tasks that are associated with each roleExplain modeling concepts and the UML notation that is relevant to modeling for business rules and eventsDefine and implement object models for business rulesSet up the rule authoring environment in Designer by working with decision services and synchronizing across development and business environmentsCustomize the vocabulary that is used in rulesDiscover and analyze business rules for implementationUse the Operational Decision Manager rule editors to author business rules and decision tablesRun tests and simulations in the Decision Center Enterprise console to validate decision logic and rule changesExplain governance issues and work with Operational Decision Manager features that support decision governance This course introduces business analysts to IBM Operational Decision Manager V8.7.1. You learn the concepts and skills that are necessary to capture, author, validate, and manage business rules with Operational Decision Manager. Course Outline Course introduction Introducing IBM Operational Decision Manager V8.7.1 Exercise: Operational Decision Manager in action Modeling for business rules Exercise: Building the model on paper Exercise: Implementing the model Understanding decision services Exercise: Setting up a decision service Working with the BOM Exercise: Working with the BOM Introducing Decision Center Exercise: Exploring the Decision Center Business console Exercise: Exploring the Decision Center Enterprise console Introducing rule authoring Exercise: Understanding the case study Discovering and analyzing rules Exercise: Discovering rules Exercise: Analyzing rules Working with conditions in rules Exercise: Working with conditions in rules Working with definitions in rules Exercise: Working with definitions in rules Writing complete rules Exercise: Writing complete rules Authoring decision tables and trees Exercise: Authoring decision tables and trees Exercise: Authoring rules: Putting it all together Running tests and simulations in the Enterprise console Exercise: Running tests and simulations in the Enterprise console Introducing decision governance Exercise: Working with the decision governance framework Course summary

WB396 IBM Managing Decisions in IBM Operational Decision Manager V8.7.1
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Identity Management and Active Directory Integration with exam (RH363)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Red Hat Certified System Administrator (RHCSA) who wants to learn how to provision and configure IdM technologies across both Linux and Windows applications Identity management specialist or engineer Access management specialist or engineer Web application developer DevOps specialist Overview As a result of attending this course, you will gain an understanding of the architecture of an identity management realm and trusted relationships using both Red Hat Enterprise Linux Identity Management and Microsoft Active Directory. You will be able to create, manage, and troubleshoot user management structures, security policies, local and remote secure access methods, and implementation technologies such as Kerberos, PKI, and certificates. You should be able to demonstrate these skills: Create and manage a scalable, resilient Identity Management realm, including both Linux and Microsoft Windows clients and servers. Create and manage secure access configurations, including managing and troubleshooting Kerberos, certificate servers, and access control policies. Integrate IdM as the back end for other major enterprise tools in the Red Hat portfolio, including Satellite Server and Tower. This course will empower you with the skills to configure and manage IdM, the comprehensive Identity Management solution bundled with Red Hat© Enterprise Linux.You will master these skills on the most requested Red Hat Identity Management (IdM) capabilities, including Active Directory trusts, multi-product federation, configuration management with Ansible, integrated certificate management, single sign-on, one-time passwords, and cybersecurity policy conformance. This course covers the same material as RH362, but includes the Red Hat Certified Specialist in Identity Management exam (EX362). Install Red Hat Identity Management Describe and install Red Hat Identity Management (IdM). Centralize Identity Management Explain the IdM server services, explore IdM clients access methods, and install an IdM client. Authenticate identities with Kerberos Define the Kerberos protocol and configure services for Kerberos authentication. Integrate IdM with Active Directory Create a trust relationship with Active Directory. Control user access Configure users for authorized access to services and resources. Manage a public key infrastructure Manage certificate authorities, certificates, and storing secrets. Maintain IdM operations Troubleshoot and recover Identity Management. Integrate Red Hat products with IdM Configure major services to share the IdM authentication database. Install scalable IdM Construct a resilient and scalable Identity Management topology.

Red Hat Identity Management and Active Directory Integration with exam (RH363)
Delivered OnlineFlexible Dates
Price on Enquiry

Using Google Workspace v1.0

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for business users, educators, students, and knowledge workers in a variety of roles and fields who want to be able to use the apps included in Google Workspace to create and manage various types of files and communicate and collaborate with colleagues. Overview In this course, you will use the various apps included in Google Workspace to work productively as part of a team. You will: Navigate the Google Workspace environment and use Gmail to send and manage email correspondence. Manage schedules using Google Calendar™. Communicate with colleagues over text, voice, and video using Google Chat and Google Meet. Store and share files using Google Drive. Collaborate on documents using Google Docs, Google Slides™, and Google Keep™. Collaborate on data using Google Sheets and Google Forms™. Collaborate on websites using Google Sites™. The core productivity apps that make up the Google Workspace? suite enable users to work together on a variety of projects and tasks across many different industries and job roles. This course will teach you how to work efficiently and effectively in apps like Gmail?, Google Drive?, Google Docs?, Google Sheets?, Google Meet?, Google Chat?, and more?all while participating in a collaborative team environment. Lesson 1:Getting Started with Google Workspace Topic A: Navigate Google Workspace Topic B: Send and Manage Email Using Gmail Lesson 2:Managing Schedules Using Google Calendar Topic A: Create and Manage Events Topic B: Customize Calendars Topic C: Create and Share Calendars Topic D: Create and Manage Tasks Lesson 3:Communicating Using Google Chat and Google Meet Topic A: Chat Using Google Chat Topic B: Participate in Meetings Using Google Meet Lesson 4:Storing and Sharing Files Using Google Drive Topic A: Add Files and Folders Topic B: Manage Files and Folders Lesson 5:Collaborating on Documents Using Docs, Slides, and Keep Topic A: Create and Edit Documents Using Google Docs Topic B: Design Presentations Using Google Slides Topic C: Take Notes Using Google Keep Lesson 6:Collaborating on Data Using Sheets and Forms Topic A: Create and Manage Spreadsheets Using Google Sheets Topic B: Design Surveys Using Google Forms Lesson 7:Collaborating on Websites Using Sites Topic A: Create and Edit Sites Topic B: Share and Publish Sites

Using Google Workspace v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Workspace ONE: Integrations [V22.x]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain the general features and functionality that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this two-day course, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with VMware Workspace ONE© UEM to securely distribute business-critical applications from any device and configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure system and productivity integrations for Workspace ONE Access and Workspace ONE UEM. The course provides the principles of identity and access management. You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Course Introduction Introductions and course logistics Course objectives Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions enabled by Workspace ONE Access Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Examine the workflow of integrations Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by VMware Unified Access Gateway? Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application single sign-on authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile single sign-on Outline mobile single sign-on workflows Intelligence and Automation Summarize the features of Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence

VMware Workspace ONE: Integrations [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Discover Salesforce Fundamentals to Support Your Business (BSX101)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is ideal for business users - the people who need to learn what's possible with Salesforce functionality across the suite of products, but aren't necessarily responsible for managing the application. If you're a customer service manager, business executive, business operations manager, sales operations manager, or any other operations, management, or process analysis 'super user,' this class is just what you need to better understand the business value of the Salesforce Platform. Overview Describe the primary business value of each major Salesforce Cloud. Manage users and data. Manage basic org configuration. Create email templates. Create reports and dashboards. Apply and champion Chatter. Understand the Salesforce implementation and maintenance lifecycle. Extend Salesforce functionality beyond basic configuration. Explore what?s possible with Salesforce. In this 3-day class, our Salesforce experts will walk you through the Salesforce Platform, its specific applications, and their business values and benefits. Familiarize yourself with Salesforce Cloud, and learn about platform features and processes to more effectively support day-to-day Salesforce operations within your organization. Through interactive lectures, discussions, and hands-on exercises, you?ll recognize the core elements of the implementation lifecycle, the key considerations to drive user adoption, and the important components of ongoing management of your Salesforce environment. Introduction Understand How Salesforce Works Explore Salesforce Applications Review Salesforce Organization Data Access and Security Control Org Access Manage Who Views and Modifies Objects Unlock Access to Records Share Access to Records Lock Down Individual Fields User Management and Troubleshooting Create New Users Troubleshoot Login, Record Access, and Field Visibility Issues Salesforce Customizations Think About Your Implementation Explore Custom Fields, Picklists, Page Layouts, and Record Types Create Email Templates Business Processes Automation Review Validation Rules Review Assignment and Escalation Rules Review Web-to-Lead and Entitlements Review Lightning Process Builder and Workflow Review Approval Processes and Visual Workflow Reports Explore the Reports Tab, Folders, and Formats Explore the Report Builder Summarize Your Data Dashboards and Data Insights Get More Insight from Your Data Visualize Your Data with Dashboards Create Your Analytics Strategy Everyday Salesforce Collaborate with Chatter, Groups, and Communities Share Feedback with Chatter Answers and Ideas Go Mobile with Salesforce1 Make Salesforce Part of Your Day Data Management Create a Data Migration Strategy Ensure Data Quality Extending Salesforce Drive a Salesforce Implementation Customize Salesforce Using Custom Objects, Apps, and the Salesforce AppExchange Build It Yourself Wrap-up and Certification Review the Certification Process and Resources

Salesforce Discover Salesforce Fundamentals to Support Your Business (BSX101)
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Threat Intelligence Analyst (C|TIA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration

EC-Council Certified Threat Intelligence Analyst (C|TIA)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Channel partners and resellers Network administrators Network engineers Sales engineers System engineers Technical architects Technical support personnel Overview After taking this course, you should be able to: Identify the Cisco Digital Network Architecture solution by describing the vision, strategy, general concepts, and components. Describe the Cisco DNA Center design application, hierarchical network design, and basic network settings, and describe the integration of Cisco DNA Center with Cisco Identity Services Engine (Cisco ISE) for Automation and Assurance. Describe the Cisco DNA Center Inventory and the available mechanisms for discovering and adding network devices, and explore the device compatibility with Cisco DNA Center and SD-Access. Describe the Cisco DNA Center automation features such as configuration templates, software image maintenance, and Plug and Play (PnP) device onboarding. Explore the Cisco DNA Center user interface, the available workflows for onboarding devices, and how to design and manage a network. Introduce Cisco SD-Access, describe the different node types in the fabric and the two-level segmentation provided by the solution, and take a deep dive into the control and data plane protocols used in Cisco SD-Access. Describe the Cisco DNA Center workflow for deploying Cisco SD-Access, defining all the prerequisite network settings and profiles, defining the required policies, creating fabric domains and sites, and provisioning fabric nodes. Create and manage fabric domains and sites, provision fabric devices, and onboard your endpoints in a single site or distributed fabric campus network. Describe the features available for automating and monitoring wireless networks with Cisco DNA Center, and describe the available deployment models with their benefits and limitations, such as wireless Over-the-Top (OTT) and SD-Access Wireless. Describe the Cisco SD-Access Extension for IoT solution, its architecture and components, and the benefits and limitations of the solution Describe the use cases and migration scenarios for migrating users from traditional campus to SD The Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1 course teaches you how the functionality of Cisco© SD-Access fits into Cisco Digital Network Architecture (Cisco DNA?). Through a combination of lessons and hands-on learning, you will practice operating, managing, and integrating Cisco DNA Center, programmable network infrastructure, and Cisco SD-Access fundamentals. You will learn how Cisco delivers intent-based networking across the campus, branch, WAN, and extended enterprise and ensures that your network is operating as intended. Course Outline Introducing Cisco DNA Architecture Cisco DNA Center Design Cisco DNA Center Inventory Cisco DNA Center Automation Explore Cisco DNA Center and Automating Network Changes Introducing Cisco Software-Defined Access Deploying Cisco Software-Defined Access Deploy Wired Fabric Networks with Cisco DNA Center Cisco SD-Access for Wireless Cisco SD-Access Extension for IoT Deploy Brownfield and Fabric Wireless Network with Cisco DNA Center Migrating to Cisco SD-Access Cisco SD-Access Multicast Integrating Cisco DNA Center Deploy SD-Access Layer 2 Borders and Multicast and Integrate Cisco DNA Center with External Services or Applications Understanding Programmable Network Infrastructure Operating and Managing Cisco DNA Infrastructure Test Drive Cisco DNA Center APIs

Cisco Transforming to a Cisco Intent-Based Network (IBNTRN) v1.1
Delivered OnlineFlexible Dates
Price on Enquiry

GRC330 SAP Process Control 10.1 - Implementation and Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Implmentation Consultants, Business Users, IT Governance Experts, Compliance Managers Overview Discuss the purpose and business use of Process ControlDescribe key features and related harmonization topicsDescribe risk-based internal controlsConfigure Process Control customizing settings and those shared across GRCCreate and manage master dataDiscuss security and authorization requirementsImplement the Process Control solutionUse risk-managed financial compliance practicesPlan and process surveys and testsSet up and maintain Continuous MonitoringIntegrate and use Process Control with Policy ManagementDiscuss operational complianceAggregate deficienciesUse the harmonized reporting frameworkDescribe the use of custom-defined fields and document search This course offers hands-on configuration and implementation of SAP Process Control 10.1, as well as important concepts you will need to know in order to prepare for implementation and ongoing prevention of process risk. Enterprise Goverance, Riskl, and Compliance (eGRC) Risk-Based Approach to Managing Compliance Initiatives Integrated GRC Approach Governance Governance Overview Governance Using Process Control 10.1 Daily Business Use Harmonization Overview Harmonization Concepts Work Centers Setting Up an Entry Page Technical Landscape Configuration Requirements Customizing Central Tasks Shared Master Data and Reports Workflow Authorization Updates Process Control-Specific Customizing Create & Manage Master Data Master Data Overview Setting Up an Organization Hierarchy Setting Up the Account Group Hierarchy Setting Up the Central Process Hierarchy Setting Up the Indirect Entity-Level Control Hierarchy Harmonized Risk Model Uploading Master Data with MDUG Content Lifecycle Management Master Data Change Request Workflow Surveys and Manual Tests Survey and Test Overview Planner Overview Assessment Survey Manual Test Manual Test ? Offline Forms and Data Sheets Disclosure Survey Issue Remediation Risk-Managed Financial Compliance Risk-Based Financial Compliance Materiality Analysis Risk Assessment Control Risk Rating Test Strategy Risk Coverage Analysis Integration with SAP Audit Management Ad Hoc Issues Ad Hoc Issues Integration with SAP Fraud Management Policy Management Policy Management ? Overview Configuring Policy Management Policy Lifecycle Management Continuous Monitoring Continuous Monitoring ? Overview Continuous Monitoring ? Preconfiguration Creating a Data Source Creating a Business Rule Assigning Business Rules to a Control Scheduling a Continuous Monitoring Job Monitoring a Continuous Monitoring Job SAP Queries SAP BW Query Setting Up a Configurable Rule Subscenario Create a Programmed Rule ABAP Reports Process Integration Subscenario SoD Integration Web Service for Continuous Monitoring Event-Based Monitoring SAP HANA Views New CCM Content Upload Capabilities Operational Compliance Overview Operational Compliance Overview and Key Trends CAPA Operational Compliance-Specific Focus in CCM Closing Activies in an ICS Management Cycle Sign-Off Aggregation of Deficiencies Reporting Reports Overview Report Framework Harmonization Dashboard Overview Security & Authorization Security and Authorization ? Overview Authorization Configuration and Setup Implementation Scope and Approach Implementation Scope and Approach Establishing a Compliance Framework Configuring a Multi-Compliance Framework (MCF) Other Process Control Features Custom-Defined Fields Document Search

GRC330 SAP Process Control 10.1 - Implementation and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Configuring BIG-IP LTM: Local Traffic Manager

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP LTM system. This course gives network professionals a functional understanding of BIG-IP Local Traffic Manager, introducing students to both commonly used and advanced BIG-IP LTM features and functionality. Incorporating lecture, extensive hands-on labs, and classroom discussion, the course helps students build the well-rounded skill set needed to manage BIG-IP LTM systems as part of a flexible and high performance application delivery network. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Module 3: Load Balancing Traffic with LTM Exploring Load Balancing Options Using Priority Group Activation and Fallback Host Comparing Member and Node Load Balancing Module 4: Modifying Traffic Behavior with Persistence Reviewing Persistence Introducing SSL Persistence Introducing SIP Persistence Introducing Universal Persistence Introducing Destination Address Affinity Persistence Using Match Across Options for Persistence Module 5: Monitoring Application Health Differentiating Monitor Types Customizing the HTTP Monitor Monitoring an Alias Address and Port Monitoring a Path vs. Monitoring a Device Managing Multiple Monitors Using Application Check Monitors Using Manual Resume and Advanced Monitor Timer Settings Module 6: Processing Traffic with Virtual Servers Understanding the Need for Other Virtual Server Types Forwarding Traffic with a Virtual Server Understanding Virtual Server Order of Precedence Path Load Balancing Module 7: Processing Traffic with SNATs Overview of SNATs Using SNAT Pools SNATs as Listeners SNAT Specificity VIP Bounceback Additional SNAT Options Network Packet Processing Module 8: Modifying Traffic Behavior with Profiles Profiles Overview TCP Express Optimization TCP Profiles Overview HTTP Profile Options OneConnect Offloading HTTP Compression to BIG-IP HTTP Caching Stream Profiles F5 Acceleration Technologies Module 9: Selected Topics VLAN, VLAN Tagging, and Trunking Restricting Network Access SNMP Features Segmenting Network Traffic with Route Domains Module 10: Deploying Application Services with iApps Simplifying Application Deployment with iApps Using iApps Templates Deploying an Application Service Leveraging the iApps Ecosystem on DevCentral Module 11: Customizing Application Delivery with iRules and Local Traffic Policies Getting Started with iRules Configuring and Managing Policy Rules Module 12: Securing Application Delivery with LTM Understanding Today?s Threat Landscape Integrating LTM Into Your Security Strategy Defending Your Environment Against SYN Flood Attacks Defending Your Environment Against Other Volumetric Attacks Addressing Application Vulnerabilities with iRules and Local Traffic Policies Detecting and Mitigating Other Common HTTP Threats Module 13: Final Lab Project About the Final Lab Project

F5 Networks Configuring BIG-IP LTM: Local Traffic Manager
Delivered OnlineFlexible Dates
Price on Enquiry