Description This Compliance Manager Diploma is designed for all organizations that wish to improve Compliance Management, which is the core element of a functioning management system. Being able not only to monitor but to manage compliance in your organisation constitutes one of the building blocks to guarantee an effective implementation of a management system as required regulations for any aviation organization. The Compliance Manager Diploma will provide you with a deep understanding of aviation related requirements for a Compliance Management System including requirements related to documentation, audit techniques, reporting and management of records. Furthermore it will provide you with guidance on how to ensure your Compliance Management will cooperate with your SMS and how to verify the functionality and regulatory compliance of your SMS. Through the course you will receive both the theoretical background and the tools and practical knowledge needed to successfully implement and operate Compliance Management to strengthen your Management System. Assessment: This course does not involve any MCQ test. Students need to answer assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Once the answers are submitted, the instructor will check and assess the work. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Compliance Manager Diploma is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Compliance Manager Diploma is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Module: 01 Compliance Manager 00:30:00 Compliance Management System 00:30:00 The Compliance House 00:30:00 Compliance and Auditing 00:30:00 Compliance and Ethics 00:30:00 Module: 02 Understanding Risk 00:30:00 Risk Management Activities 00:05:00 Assessing Risk 00:15:00 Responding to Risks 00:15:00 Resourcing Controls 00:05:00 Reaction Planning 00:15:00 Reporting and Monitoring 00:15:00 Module: 03 Information Security Risk Management 00:30:00 Risk Management 00:30:00 Risk Reporting and Communication 00:30:00 External and Internal Factors 00:30:00 Strategic Risk Management 00:15:00 Risk Analysis and Assessment 00:45:00 Enterprise Risk Management (ERM) 00:45:00 Module: 04 The Role And Responsibilities of a Security Officer 00:30:00 Security Management Governance 00:15:00 The Basics Of Security Management 00:15:00 Security Management Planning And Implementing 00:15:00 How to Build a Security Management Team 00:15:00 Assessment Assignment - Compliance Manager Diploma 00:00:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 2 Days 12 CPD hours This course is intended for This course is designed for security administrators and Check Point resellers who need to manage and monitor issues that may occur within their Security Management environment. Overview Understand how to use Check Point resources for support. Understand how to perform packet captures using tcmdump and FW Monitor command tools. Understand the basic process of kernel debugging, and how debug commands are structured. Recognize how to use various Linux commands for troubleshooting system issues. Recognize communication issues that may occur between SmartConsole and the SMS and how to resolve them. Understand how to troubleshoot SmartConsole login and authentication issues. Understand how to prevent and resolve licensing and contract issues. Understand how to troubleshoot issues that may occur during policy installation. Understand communication issues that may occur when collecting logs and how to resolve them. Recall various tools to use when analyzing issues with logs. Understand how to restore interrupted communications during heavy logging. Understand how NAT works and how to troubleshoot issues. Understand Client Side and Server Side NAT. Understand how the Access Control Policy functions and how the access control applications work together. Understand how to troubleshoot issues that may occur with Application Control and URL Filtering. Understand how the HTTPS Inspection process works and how to resolve issues that may occur during the process. Understand how to troubleshoot Content Awareness issues. Recognize how to troubleshoot VPN-related issues. Understand how to monitor cluster status and work with critical devices. Recognize how to troubleshoot State Synchronization. Understand how to troubleshoot communication issues between Identity Sources and Security Gateways. Understand how to troubleshoot and debug issues with internal Identity Awareness processes. The goal of this course is to provide an understanding of the concepts and skills necessary to troubleshoot issues which may occur when managing the Check Point Security Management architecture and Security Gateways. Course Outline An Introduction to Troubleshooting SmartConsole and Policy Management Troubleshooting Monitoring Logging Activity Troubleshooting Issues with NAT Understanding the Unified Access Control Policy Basic VPN Troubleshooting Monitoring ClusterXL Connections Understanding Identity Awareness Additional course details: Nexus Humans CCTA Check Point Troubleshooting Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCTA Check Point Troubleshooting Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Learn to program with Python 3, visualize algorithms and data structures, and implement them in Python projects
Unlock the keys to the world of Autism and Safeguarding Children with this compelling course bundle! We are excited to bring you two QLS-endorsed courses: "Autism" and "Child Protection & Safeguarding." As an added bonus, we've included five additional relevant CPD QS accredited courses to further enrich your knowledge: "Children's Mental Health," "Learning Disability Nursing," "Diabetes," "Dementia Awareness," and "Child Language Disorder (CLD)." What makes this Autism and Safeguarding Children bundle unique is its emphasis on theoretical understanding. Our QLS-endorsed courses don't just offer top-tier learning material but also equip you with a hardcopy certificate upon completion, validating your dedication and expertise. Alongside, you will delve into a spectrum of critical topics through our five CPD QS accredited courses, each a specialised area with immense societal relevance. This bundle is a goldmine of knowledge for anyone keen on understanding Autism and the complexity of safeguarding children. As you navigate through these courses, you'll discover the layers of mental health, learning disabilities, and disease awareness. Your journey will culminate in mastering Child Language Disorders, empowering you to make significant contributions in the field of Autism and Safeguarding Children. Take your first step towards mastering Autism and Safeguarding Child studies. Immerse yourself in this all-inclusive course bundle today and enjoy a fulfilling learning experience like no other! This bundle comprises the following courses: QLS Endorsed Courses: Course 01: Diploma in Autism and Dyslexia Awareness at QLS Level 5 Course 02: Diploma in Child Protection & Safeguarding Children at QLS Level 5 CPD QS Accredited Courses: Course 03: Children's Mental Health Course 04: Learning Disability Nursing Course 05: Diabetes Course 06: Dementia Awareness Course 07: Child Language Disorder (CLD) Learning Outcomes By the end of this Autism and Safeguarding Children bundle course, learners will be able to: Gain a comprehensive understanding of Autism and child safeguarding measures. Develop an understanding of children's mental health and associated challenges. Enhance your knowledge of learning disability nursing. Learn about diabetes, its effects, and management strategies. Acquire insights into Dementia, its types, symptoms, and care. Understand Child Language Disorder and the techniques to handle it. Become well-versed with child protection and safeguarding protocols. Earn QLS-endorsed hardcopy certificates for Autism and Child Protection & Safeguarding courses. This course bundle is meticulously crafted to provide learners with a broad theoretical understanding of Autism and child safeguarding. The QLS-endorsed courses offer an in-depth study of Autism and the measures necessary for Child Protection & Safeguarding. These topics are of paramount importance and are highly relevant in today's society. The other five courses in the bundle will walk you through topics such as Children's Mental Health, Learning Disability Nursing, Diabetes, Dementia Awareness, and Child Language Disorder. Each course is designed to equip learners with comprehensive knowledge of the respective subjects. By understanding these essential aspects, you can significantly contribute to safeguarding children's health and well-being. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Autism and Safeguarding Children course ideal for: Parents seeking a deeper understanding of their child's development and health. Teachers and school administrators keen on safeguarding students' welfare. Health and social care professionals aiming to enhance their knowledge base. Anyone interested in the fields of Autism and Child Safeguarding. Career path Autism Support Specialist: Salary range £21,000 - £30,000. Child Protection Officer: Salary range £27,000 - £35,000. Children's Mental Health Counselor: Salary range £23,000 - £37,000. Learning Disability Nurse: Salary range £24,000 - £37,000. Dementia Care Specialist: Salary range £20,000 - £33,000. Certificates Digital certificate Digital certificate - Included Hard copy certificate Hard copy certificate - Included
In this course, you will dive deep into the 5 domains of the CompTIA Pentest+ exam and learn each topic in a succinct manner. You will learn the structure of the exam and create your own pentest lab, and have the confidence to ace the exam, whenever you decide to attempt it.
Imagine a project where multiple teams and stakeholders are involved, and documents are continuously being created and updated. Without proper document control, it could be challenging to track and manage all the necessary information, leading to confusion, delays, and errors. This course in Document Control provides a comprehensive understanding of the principles, strategies, and tools required to manage documentation effectively. Learning Outcomes: Understand the importance of Document Control in various industries and environments. Gain knowledge of the Document Control lifecycle and its different stages. Learn about different Document Control strategies and instruments to choose the best approach for your organization. Explore the principles of quality assurance and controlling quality of documents. Understand the fundamentals of Project Document Control. Learn about Electronic Document Management Systems (EDMS) and soft copy documentation. The course in Document Control offers an in-depth understanding of managing documents effectively in different industries and environments. The course covers the fundamental principles of document control and its different elements. It also explores the different stages of the document control lifecycle, along with strategies, instruments, and tools to manage documents efficiently. Participants will gain an understanding of quality assurance and controlling the quality of documents. They will also learn about Project Document Control and Electronic Document Management Systems (EDMS) and soft copy documentation. This course is suitable for professionals seeking to enhance their knowledge of document control and its related fields. It is also ideal for individuals who are responsible for managing documents and want to learn the best practices to handle documents efficiently. Certification Upon completion of the course, learners can obtain a certificate as proof of their achievement. You can receive a £4.99 PDF Certificate sent via email, a £9.99 Printed Hardcopy Certificate for delivery in the UK, or a £19.99 Printed Hardcopy Certificate for international delivery. Each option depends on individual preferences and locations. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Professionals working in industries such as healthcare, manufacturing, engineering, construction, and IT. Document Controllers Quality Assurance Officers Project Managers Career path Document Controller: £21k - £44k per annum Quality Assurance Officer: £23k - £46k per annum Project Manager: £29k - £67k per annum Quality Manager: £28k - £62k per annum Compliance Manager: £32k - £70k per annum Information Manager: £35k - £81k per annum
Duration 5 Days 30 CPD hours This course is intended for Security engineer Network engineer Network designer Network administrator Systems engineer Consulting systems engineer Technical solutions architect Network manager Cisco integrators and partners Overview After taking this course, you should be able to: Describe information security concepts and strategies within the network Describe common TCP/IP, network application, and endpoint attacks Describe how various network security technologies work together to guard against attacks Implement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall Describe and implement basic email content security features and functions provided by Cisco Email Security Appliance Describe and implement web content security features and functions provided by Cisco Web Security Appliance Describe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console Introduce VPNs and describe cryptography solutions and algorithms Describe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco Internetwork Operating System (Cisco IOS) Virtual Tunnel Interface (VTI)-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco Firepower Next-Generation Firewall (NGFW) Describe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and Extensible Authentication Protocol (EAP) authentication Provide basic understanding of endpoint security and describe Advanced Malware Protection (AMP) for Endpoints architecture and basic features Examine various defenses on Cisco devices that protect the control and management plane Configure and verify Cisco IOS software Layer 2 and Layer 3 data plane controls Describe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions Describe basics of cloud computing and common cloud attacks and how to secure cloud environment The Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 course helps you prepare for the Cisco© CCNP© Security and CCIE© Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility, and enforcements. You will get extensive hands-on experience deploying Cisco Firepower© Next-Generation Firewall and Cisco Adaptive Security Appliance (ASA) Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch© Enterprise and Cisco Stealthwatch Cloud threat detection features. This course, including the self-paced material, helps prepare you to take the exam, Implementing and Operating Cisco Security Core Technologies (350-701 SCOR), which leads to the new CCNP Security, CCIE Security, and the Cisco Certified Specialist - Security Core certifications. Describing Information Security Concepts* Information Security Overview Assets, Vulnerabilities, and Countermeasures Managing Risk Vulnerability Assessment Understanding Common Vulnerability Scoring System (CVSS) Describing Common TCP/IP Attacks* Legacy TCP/IP Vulnerabilities IP Vulnerabilities Internet Control Message Protocol (ICMP) Vulnerabilities TCP Vulnerabilities User Datagram Protocol (UDP) Vulnerabilities Attack Surface and Attack Vectors Reconnaissance Attacks Access Attacks Man-in-the-Middle Attacks Denial of Service and Distributed Denial of Service Attacks Reflection and Amplification Attacks Spoofing Attacks Dynamic Host Configuration Protocol (DHCP) Attacks Describing Common Network Application Attacks* Password Attacks Domain Name System (DNS)-Based Attacks DNS Tunneling Web-Based Attacks HTTP 302 Cushioning Command Injections SQL Injections Cross-Site Scripting and Request Forgery Email-Based Attacks Describing Common Endpoint Attacks* Buffer Overflow Malware Reconnaissance Attack Gaining Access and Control Gaining Access via Social Engineering Gaining Access via Web-Based Attacks Exploit Kits and Rootkits Privilege Escalation Post-Exploitation Phase Angler Exploit Kit Describing Network Security Technologies Defense-in-Depth Strategy Defending Across the Attack Continuum Network Segmentation and Virtualization Overview Stateful Firewall Overview Security Intelligence Overview Threat Information Standardization Network-Based Malware Protection Overview Intrusion Prevention System (IPS) Overview Next Generation Firewall Overview Email Content Security Overview Web Content Security Overview Threat Analytic Systems Overview DNS Security Overview Authentication, Authorization, and Accounting Overview Identity and Access Management Overview Virtual Private Network Technology Overview Network Security Device Form Factors Overview Deploying Cisco ASA Firewall Cisco ASA Deployment Types Cisco ASA Interface Security Levels Cisco ASA Objects and Object Groups Network Address Translation Cisco ASA Interface Access Control Lists (ACLs) Cisco ASA Global ACLs Cisco ASA Advanced Access Policies Cisco ASA High Availability Overview Deploying Cisco Firepower Next-Generation Firewall Cisco Firepower NGFW Deployments Cisco Firepower NGFW Packet Processing and Policies Cisco Firepower NGFW Objects Cisco Firepower NGFW Network Address Translation (NAT) Cisco Firepower NGFW Prefilter Policies Cisco Firepower NGFW Access Control Policies Cisco Firepower NGFW Security Intelligence Cisco Firepower NGFW Discovery Policies Cisco Firepower NGFW IPS Policies Cisco Firepower NGFW Malware and File Policies Deploying Email Content Security Cisco Email Content Security Overview Simple Mail Transfer Protocol (SMTP) Overview Email Pipeline Overview Public and Private Listeners Host Access Table Overview Recipient Access Table Overview Mail Policies Overview Protection Against Spam and Graymail Anti-virus and Anti-malware Protection Outbreak Filters Content Filters Data Loss Prevention Email Encryption Deploying Web Content Security Cisco Web Security Appliance (WSA) Overview Deployment Options Network Users Authentication Secure HTTP (HTTPS) Traffic Decryption Access Policies and Identification Profiles Acceptable Use Controls Settings Anti-Malware Protection Deploying Cisco Umbrella* Cisco Umbrella Architecture Deploying Cisco Umbrella Cisco Umbrella Roaming Client Managing Cisco Umbrella Cisco Umbrella Investigate Overview and Concepts Explaining VPN Technologies and Cryptography VPN Definition VPN Types Secure Communication and Cryptographic Services Keys in Cryptography Public Key Infrastructure Introducing Cisco Secure Site-to-Site VPN Solutions Site-to-Site VPN Topologies IPsec VPN Overview IPsec Static Crypto Maps IPsec Static Virtual Tunnel Interface Dynamic Multipoint VPN Cisco IOS FlexVPN Deploying Cisco IOS VTI-Based Point-to-Point IPsec VPNs Cisco IOS VTIs Static VTI Point-to-Point IPsec Internet Key Exchange (IKE) v2 VPN Configuration Deploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW Cisco ASA Point-to-Point VPN Configuration Cisco Firepower NGFW Point-to-Point VPN Configuration Introducing Cisco Secure Remote Access VPN Solutions Remote Access VPN Components Remote Access VPN Technologies Secure Sockets Layer (SSL) Overview Deploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW Remote Access Configuration Concepts Connection Profiles Group Policies Cisco ASA Remote Access VPN Configuration Cisco Firepower NGFW Remote Access VPN Configuration Explaining Cisco Secure Network Access Solutions Cisco Secure Network Access Cisco Secure Network Access Components AAA Role in Cisco Secure Network Access Solution Cisco Identity Services Engine Cisco TrustSec Describing 802.1X Authentication 802.1X and Extensible Authentication Protocol (EAP) EAP Methods Role of Remote Authentication Dial-in User Service (RADIUS) in 802.1X Communications RADIUS Change of Authorization Configuring 802.1X Authentication Cisco Catalyst© Switch 802.1X Configuration Cisco Wireless LAN Controller (WLC) 802.1X Configuration Cisco Identity Services Engine (ISE) 802.1X Configuration Supplicant 802.1x Configuration Cisco Central Web Authentication Describing Endpoint Security Technologies* Host-Based Personal Firewall Host-Based Anti-Virus Host-Based Intrusion Prevention System Application Whitelists and Blacklists Host-Based Malware Protection Sandboxing Overview File Integrity Checking Deploying Cisco Advanced Malware Protection (AMP) for Endpoints* Cisco AMP for Endpoints Architecture Cisco AMP for Endpoints Engines Retrospective Security with Cisco AMP Cisco AMP Device and File Trajectory Managing Cisco AMP for Endpoints Introducing Network Infrastructure Protection* Identifying Network Device Planes Control Plane Security Controls Management Plane Security Controls Network Telemetry Layer 2 Data Plane Security Controls Layer 3 Data Plane Security Controls Deploying Control Plane Security Controls* Infrastructure ACLs Control Plane Policing Control Plane Protection Routing Protocol Security Deploying Layer 2 Data Plane Security Controls* Overview of Layer 2 Data Plane Security Controls Virtual LAN (VLAN)-Based Attacks Mitigation Sp
Are you looking to improve your current abilities or make a career move? Our unique Project Management course might help you get there! Expand your expertise with high-quality training - study the Project Management course and get an expertly designed, great-value training experience. Learn from industry professionals and quickly equip yourself with the specific knowledge and skills you need to excel in your chosen career through the Project Management online training course. This Advanced Diploma in Project Management at QLS Level 7 course is endorsed by The Quality Licence Scheme & Accredited by CPD (with 250 CPD points) to make your skill development & career progression more accessible than ever! The Project Management course is broken down into several in-depth modules to provide you with the most convenient and rich learning experience possible. Upon successful completion of the Project Management course, an instant e-certificate will be exhibited in your profile that you can order as proof of your skills and knowledge. Add these amazing new skills to your resume and boost your employability by simply enrolling in this Project Management course. This Project Management training can help you to accomplish your ambitions and prepare you for a meaningful career. So, enrol on this Project Management course today and gear up for excellence! Why Choose Us? Earn a certificate endorsed by the Quality Licence Scheme & another certificate accredited by CPDQS. Get a free student ID card! (£10 postal charge will be applicable for international delivery) Innovative and engaging content. Free assessments 24/7 tutor support. Take a step toward a brighter future! *** Course Curriculum *** Here is the curriculum breakdown of the Project Management course: Module 01: Introduction to Project Management Module 02: PMBOK and PMI Module 03: Global Project Management Module 04: Project Life Cycle Module 05: Time Management Module 06: Quality Management Module 07: Effective Planning & Scheduling Module 08: Human Resource Management Module 09: Performance Management Module 10: Talent Management Module 11: Organising Meeting and Conferences Module 12: Managing Resources Module 13: Change Management Module 14: Business Resilience and Crisis Management Module 15: Conflict Management Module 16: Stress Management Module 17: Communication Skills Module 18: Procurement & Purchasing Management Module 19: Risk Management Assessment Process You must complete the assignment questions given at the end of the and score a minimum of 60% to pass the exam and achieve the Quality Licence Scheme endorsed certificates. Our expert trainers will assess your assignment and give you feedback after you submit the assignment. After passing the Advanced Diploma in Project Management at QLS Level 7 exam, you will be able to request a certificate with additional cost that the Quality Licence Scheme has endorsed. CPD 200 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this Project Management: Project Manager course. This course is open to everybody. Requirements You will not need any prior background or expertise to enrol in this course. Career path Project Manager (Avg. Annual Salary: £25,000 - £65,000) Project Scheduler (Avg. Annual Salary: £15,000 - £35,000) Quality Assurance Tester (Avg. Annual Salary: £18,000 - £50,000) Certificates Certificate Accredited by CPDQS Digital certificate - £10 Advanced Diploma in Project Management at QLS Level 7 Hard copy certificate - £136 Show off Your New Skills with a Certificate of Completion After successfully completing the Advanced Diploma in Project Management at QLS Level 7, you can order an original hardcopy certificate of achievement endorsed by the Quality Licence Scheme. The certificate will be home-delivered, with a pricing scheme of - 139 GBP inside the UK 149 GBP (including postal fees) for International Delivery Certificate Accredited by CPDQS Upon finishing the Project Management course, you need to order to receive a Certificate Accredited by CPDQS that is accepted all over the UK and also internationally. The pricing schemes are: 29 GBP for Printed Hardcopy Certificate inside the UK 39 GBP for Printed Hardcopy Certificate outside the UK (International Delivery)
Duration 4 Days 24 CPD hours This course is intended for The course content is aimed at operators of devices running the Junos OS in a NOC environment. These operators include network engineers, administrators, support personnel, and reseller support personnel. Overview After successfully completing this course, you should be able to: Reduce the time it takes to identify and isolate the root cause of an issue impacting your network. Gain familiarity with Junos products as they pertain to troubleshooting. Become familiar with online resources valuable to Junos troubleshooting. Gain familiarity with Junos tools used in troubleshooting. Identify and isolate hardware issues. Troubleshoot problems with the control plane. Troubleshoot problems with interfaces and other data plane components. Describe the staging and acceptance methodology. Troubleshoot routing protocols. Describe how to monitor your network with SNMP, RMON, Junos Traffic Vision (formerly known as JFlow), and port mirroring. Become familiar with JTAC procedures. This instructor-led four-day course is designed to provide introductory troubleshooting skills for engineers in a network operations center (NOC) environment. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention Additional course details: Nexus Humans JTNOC - Junos Troubleshooting in the NOC training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JTNOC - Junos Troubleshooting in the NOC course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is for personnel who are assessing and planning to deploy a storage area network. Overview Summarize the storage infrastructure challenges and the various storage architectures such as DAS, SAN and NASClassify SAN terminology including trunking, zoning, multipathing and fabric mergingRecognize b-type Data Center Management tools such as Data Center Fabric Manager and Network Advisor (NA)Classify the various tabs in the Network Advisor ToolRecall the Cisco MDS management toolsRecognize the importance of Converged Enhanced EthernetCompare the features of iSCSI and FCoE This course provides an overview of storage network and data center networking technology. Day 1 Welcome Unit 1 - Evolution of storage area networks Unit 2 - Fibre Channel Day 2 Unit 3 - Fibre Channel switches and directors: Brocade (b-type) Unit 4 - Brocade DCFM and Network Advisor Day 3 Exercise 0 - Lab setup and preliminary instructions Exercise 1 - Brocade switch 2109: Initial configuration Exercise 2 - Management software installation Exercise 3 - Brocade Fabric Manager Exercise 4 - Brocade switch: Zoning configuration Exercise 5 - V3700 storage provisioning using iSCSI Exercise 6 - Brocade VDX fabric merging Unit 5 - Fibre Channel switches and directors: Cisco MDS Day 4 Unit 6 - Converged Enhanced Ethernet Unit 7 - Fibre Channel over Ethernet Unit 8 - iSCSI Exercise 7 - Basic configuration Exercise 8 - Management tools installation Exercise 9 - VSAN creation Exercise 10 - Zoning configuration on Cisco Exercise 11 - Configuring the DS3500 storage subsystem Additional course details: Nexus Humans SN71 IBM Storage Area Networking Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SN71 IBM Storage Area Networking Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.